Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
— This paper proposes a two-layer Joint Radio Resource Management (JRRM) framework to improve the efficiency in multi-radio and multi-operator cellular scenarios. On the one hand...
— This paper presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Networks (WSN) and geostatistical analysis for total spatial awar...
Charles C. Castello, Jeffrey Fan, Asad Davari, Rue...