Sciweavers

244 search results - page 35 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
IJIPT
2006
58views more  IJIPT 2006»
13 years 7 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...
IJSNET
2007
101views more  IJSNET 2007»
13 years 7 months ago
Some problems of directional sensor networks
Abstract: Wireless sensor networks are often based on omni-sensing and communication models. In contrast, in this paper, we investigate sensor networks with directional sensing and...
Huadong Ma, Yonghe Liu
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
TITB
2010
181views Education» more  TITB 2010»
13 years 2 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
MOBISYS
2009
ACM
14 years 8 months ago
R2D2: regulating beam shape and rate as directionality meets diversity
We design, implement, and evaluate a vehicular communication system that improves uplink connectivity through multi-lobe beam pattern switching on a smart antenna. Directionality ...
Kishore Ramachandran, Ravi Kokku, Karthikeyan Sund...