Sciweavers

244 search results - page 47 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
WCNC
2008
IEEE
14 years 1 months ago
Selective Relaying in Cooperative OFDM Systems: Two-Hop Random Network
— In this paper, we investigate two selective relaying schemes in cooperative OFDM systems. Selective OFDMA relaying, where the relay selection is performed in a per-subcarrier m...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.
MOBISYS
2007
ACM
14 years 7 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...
WCNC
2008
IEEE
14 years 1 months ago
Quantize-and-Forward Relaying with M-ary Phase Shift Keying
Abstract—Using cooperative transmission, two or more singleantenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol tha...
Michael R. Souryal, Huiqing You
SECON
2007
IEEE
14 years 1 months ago
Fairness and Physical Layer Capture in Random Access Networks
Abstract— While physical layer capture has been observed in real implementations of wireless devices which randomly accessing shared channels, fair rate control algorithms based ...
Hoon Chang, Vishal Misra, Dan Rubenstein
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
14 years 1 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...