Sciweavers

244 search results - page 11 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
ISCAS
2007
IEEE
149views Hardware» more  ISCAS 2007»
14 years 1 months ago
Compact, Low Power Wireless Sensor Network System for Line Crossing Recognition
— Many application-specific wireless sensor network (WSN) systems require small size and low power features due to their limited resources, and their use in distributed, wireles...
Chung-Ching Shen, Roni Kupershtok, Bo Yang, Felice...
VTC
2006
IEEE
113views Communications» more  VTC 2006»
14 years 1 months ago
On the Practical Issues in Hop Count Localization of Sensors in a Multihop Network
– Simple algorithms have been developed in the area of node localization in a wireless sensor network. For these simple algorithms to work, several assumptions were made. However...
Eddie B. S. Tan, Joo Ghee Lim, Winston Khoon Guan ...
PIMRC
2010
IEEE
13 years 5 months ago
Energy-delay tradeoff analysis in embedded M2M networks with channel coding
Abstract--Machine-to-Machine (M2M), an emerging communications paradigm, is a facilitator of data flows between machines used, e.g., in mission-critical applications. Focusing in t...
Tatjana Predojev, Jesus Alonso-Zarate, Mischa Dohl...
IACR
2011
192views more  IACR 2011»
12 years 7 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...