Sciweavers

244 search results - page 44 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
TDSC
2008
99views more  TDSC 2008»
13 years 7 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
TIFS
2008
208views more  TIFS 2008»
13 years 7 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
TITB
2008
124views more  TITB 2008»
13 years 7 months ago
Miniature in vivo Robots for Remote and Harsh Environments
Abstract--Long-term human space exploration will require contingencies for emergency medical procedures including some capability to perform surgery. The ability to perform minimal...
Mark Rentschler, Stephen R. Platt, Kyle R. Berg, J...
JSAC
2007
81views more  JSAC 2007»
13 years 7 months ago
Packet Prioritization in Multihop Latency Aware Scheduling for Delay Constrained Communication
— This paper addresses the problem of optimizing the packet transmission schedule in a multihop wireless network with end-to-end delay constraints. The emphasis is to determine t...
Ben Liang, Min Dong
PUC
2000
142views more  PUC 2000»
13 years 7 months ago
Context-Aware Telephony Over WAP
In this paper we introduce a novel approach to share context to enhance the social quality of remote mobile communication. We provide an analysis of how people start a conversation...
Albrecht Schmidt, Antti Takaluoma, Jani Mänty...