Sciweavers

423 search results - page 22 / 85
» Design of a Password-based Authentication Method for Wireles...
Sort
View
ISSA
2008
13 years 8 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
COMCOM
2000
105views more  COMCOM 2000»
13 years 7 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
HICSS
2012
IEEE
251views Biometrics» more  HICSS 2012»
12 years 3 months ago
Topology Skewing for Improved Route Selection in Wireless Multi-hop Networks
—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...
MOBIHOC
2008
ACM
14 years 7 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang
GLOBECOM
2009
IEEE
13 years 5 months ago
Efficient Data Collection for Wireless Networks: Delay and Energy Tradeoffs
In this paper, we study efficient data collection for wireless sensor networks. We present efficient distributed algorithms with approximately the minimum delay, or the minimum mes...
Chao Ren, XuFei Mao, Xiang-Yang Li, Ping Xu, Guoju...