Sciweavers

589 search results - page 106 / 118
» Evaluating mobile phones as risk information providers
Sort
View
COMSUR
2006
96views more  COMSUR 2006»
13 years 7 months ago
A survey of multipoint relay based broadcast schemes in wireless ad hoc networks
Almost every routing protocol in mobile ad hoc networks (MANETs) depends on a broadcast scheme to disseminate routing information. For this reason, creating an efficient broadcast...
Ou Liang, Y. Ahmet Sekercioglu, Nallasamy Mani
ENTCS
2008
390views more  ENTCS 2008»
13 years 6 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
CHI
2009
ACM
14 years 2 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
ICPPW
2003
IEEE
14 years 26 days ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
MIR
2003
ACM
119views Multimedia» more  MIR 2003»
14 years 25 days ago
A wireless handheld multi-modal digital video library client system
We developed technologies for transmitting video contents over wireless platforms, and encapsulated these video delivery and presentation technologies into a client system for acc...
Michael R. Lyu, Jerome Yen, Edward Yau, Sam K. S. ...