Sciweavers

244 search results - page 42 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
INDOCRYPT
2009
Springer
14 years 2 months ago
Towards Secure and Practical MACs for Body Sensor Networks
Wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst body sensor network (BSN) must be secured with strong authenticity to...
Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zh...
ICDCS
2008
IEEE
14 years 2 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
WCNC
2008
IEEE
14 years 1 months ago
Hop-by-Hop Routing Strategy for Multihop Decode-and-Forward Cooperative Networks
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Lu Zhang 0005, Leonard J. Cimini Jr.
VTC
2007
IEEE
14 years 1 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
UCS
2007
Springer
14 years 1 months ago
Using Auction Based Group Formation for Collaborative Networking in Ubicomp
In many Ubicomp scenarios tiny wireless embedded sensor devices are used, and devices often collaborate to accomplish a common goal. This paper presents a group formation method de...
Christian Decker, Emilian Peev, Till Riedel, Marti...