Sciweavers

832 search results - page 112 / 167
» Effect of Malicious Synchronization
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu
ICPADS
2010
IEEE
13 years 7 months ago
Utilizing RF Interference to Enable Private Estimation in RFID Systems
Counting or estimating the number of tags is crucial for RFID system. Researchers have proposed several fast cardinality estimation schemes to estimate the quantity of a batch of ...
Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo L...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 4 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
ICIP
2004
IEEE
14 years 11 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
EWSN
2007
Springer
14 years 9 months ago
Decentralized Scattering of Wake-Up Times in Wireless Sensor Networks
Duty-cycling in wireless sensor networks (WSNs) has both beneficial effects on network lifetime and negative effects on application performance due to the inability of a sensor to ...
Alessandro Giusti, Amy L. Murphy, Gian Pietro Picc...