Sciweavers

1150 search results - page 127 / 230
» Beacon Based Authentication
Sort
View
IMC
2005
ACM
14 years 2 months ago
Facilitating Access Point Selection in IEEE 802.11 Wireless Networks
The performance experienced by wireless clients in IEEE 802.11 wireless networks heavily depends on the clients’ ability to identify the Access Point (AP) that will offer the be...
Sudarshan Vasudevan, Konstantina Papagiannaki, Chr...
CN
2007
167views more  CN 2007»
13 years 9 months ago
Association management for data dissemination over wireless mesh networks
To enable multimedia broadcasting services in mesh networks, it is critical to optimize the broadcast traffic load. Traditionally, users associate with access points (APs) with th...
Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sr...
EUROCRYPT
2007
Springer
14 years 24 days ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin
FORTE
2004
13 years 10 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
ADHOC
2007
109views more  ADHOC 2007»
13 years 9 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang