Sciweavers

322 search results - page 62 / 65
» Entity Authentication and Key Distribution
Sort
View
WICON
2008
13 years 10 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
JNW
2008
83views more  JNW 2008»
13 years 8 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 6 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 8 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...
EUROIMSA
2006
166views Multimedia» more  EUROIMSA 2006»
13 years 9 months ago
Advanced Multimedia Management - Control Model and Content Adaptation
The delivery and adaptation of multimedia content in distributed and heterogeneous environments requires flexible control and management mechanisms in terminals and in control ent...
Teodora Guenkova-Luy, Andreas Schorr, Franz J. Hau...