Sciweavers

244 search results - page 9 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 9 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
GLOBECOM
2009
IEEE
14 years 2 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
MONET
2007
170views more  MONET 2007»
13 years 7 months ago
Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis
IEEE 802.11b wireless networks and Bluetooth networks provide complimentary services using the same unlicensed radio frequency band. As the benefits of utilizing these services bec...
Min Song, Sachin Shetty, Deepthi Gopalpet
ASWEC
2006
IEEE
14 years 1 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
DCOSS
2005
Springer
13 years 9 months ago
An Adaptive Blind Algorithm for Energy Balanced Data Propagation in Wireless Sensors Networks
In this paper, we consider the problem of energy balanced data propagation in wireless sensor networks and we generalise previous works by allowing realistic energy assignment. A n...
Pierre Leone, Sotiris E. Nikoletseas, José ...