Sciweavers

244 search results - page 12 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
MOBICOM
1999
ACM
13 years 12 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
GLOBECOM
2008
IEEE
13 years 8 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
IMC
2007
ACM
13 years 9 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
INFOCOM
2011
IEEE
12 years 11 months ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao