Sciweavers

447 search results - page 21 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
CODES
2006
IEEE
14 years 1 months ago
Key technologies for the next generation wireless communications
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Kyung-Ho Kim
ICICS
2010
Springer
13 years 5 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
EJWCN
2010
131views more  EJWCN 2010»
13 years 2 months ago
The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow
We present a general game-theoretical framework for the resource allocation problem in the downlink scenario of distributed wireless small-cell networks, where multiple access poi...
Gaoning He, Laura Cottatellucci, Mérouane D...
CODES
2006
IEEE
14 years 1 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
APNOMS
2006
Springer
13 years 11 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee