Sciweavers

646 search results - page 57 / 130
» On the Fundamental Limits of Broadcasting in Wireless Mobile...
Sort
View
ICASSP
2011
IEEE
13 years 23 days ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
VTC
2008
IEEE
138views Communications» more  VTC 2008»
14 years 3 months ago
Mobile IP as an Enabling Technology for VoIP in Metropolitan Wireless Mesh Networks
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...
Andres Arjona, Antti Ylä-Jääski
AAAI
2004
13 years 10 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
INFOCOM
2010
IEEE
13 years 7 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman