Sciweavers

326 search results - page 62 / 66
» Group Rekeying Schemes for Secure Group Communication in Wir...
Sort
View
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
CHI
2005
ACM
14 years 8 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
MOBIHOC
2008
ACM
14 years 7 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki
MOBISYS
2004
ACM
14 years 7 months ago
Divert: Fine-grained Path Selection for Wireless LANs
The performance of Wireless Local Area Networks (WLANs) often suffers from link-layer frame losses caused by noise, interference, multipath, attenuation, and user mobility. We obs...
Allen K. L. Miu, Godfrey Tan, Hari Balakrishnan, J...
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 2 months ago
Cooperative Spatial Reuse with Transmit Beamforming
—We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMAbased MAC to enable spatial reuse in multi-rate wireless networks. We model spa...
Chenguang Lu, Frank H. P. Fitzek, Patrick C. F. Eg...