Sciweavers

332 search results - page 59 / 67
» Measuring performance impact of security protocols in wirele...
Sort
View
MOBISYS
2004
ACM
14 years 7 months ago
Divert: Fine-grained Path Selection for Wireless LANs
The performance of Wireless Local Area Networks (WLANs) often suffers from link-layer frame losses caused by noise, interference, multipath, attenuation, and user mobility. We obs...
Allen K. L. Miu, Godfrey Tan, Hari Balakrishnan, J...
SECON
2008
IEEE
14 years 2 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
RTSS
2007
IEEE
14 years 2 months ago
FireFly Mosaic: A Vision-Enabled Wireless Sensor Networking System
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...
Anthony Rowe, Dhiraj Goel, Raj Rajkumar
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 1 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques