Sciweavers

244 search results - page 8 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
SEC
2008
13 years 9 months ago
Realizing Stateful Public Key Encryption in Wireless Sensor Network
In this paper, we present our implementation of a stateful public key encryption (stateful PKE) scheme in the wireless sensor network (WSN) environment. In order to reduce the com...
Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun ...
DCOSS
2008
Springer
13 years 9 months ago
FIT: A Flexible, LIght-Weight, and Real-Time Scheduling System for Wireless Sensor Platforms
Abstract. We propose FIT, a flexible, light-weight and real-time scheduling system for wireless sensor platforms. There are three salient features of FIT. First, its two-tier hiera...
Wei Dong, Chun Chen, Xue Liu, Kougen Zheng, Rui Ch...
TMC
2012
11 years 10 months ago
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Xinyu Zhang, Kang G. Shin
ICC
2007
IEEE
172views Communications» more  ICC 2007»
14 years 1 months ago
Performance Analysis of Cooperative Diversity Using Equal Gain Combining (EGC) Technique Over Rayleigh Fading Channels
Abstract— Cooperative diversiy is a promising technology for future wireless networks. In this paper, based on the moment generating function (MGF), we derive exact closed-form e...
Salama Ikki, Mohamed H. Ahmed
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi