Sciweavers

61 search results - page 11 / 13
» Physical layer security from inter-session interference in l...
Sort
View
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
MOBICOM
2010
ACM
13 years 8 months ago
Challenge: mobile optical networks through visual MIMO
Mobile optical communications has so far largely been limited to short ranges of about ten meters, since the highly directional nature of optical transmissions would require costl...
Ashwin Ashok, Marco Gruteser, Narayan Mandayam, Ja...
ISCC
2009
IEEE
159views Communications» more  ISCC 2009»
14 years 2 months ago
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Abstract— The fluctuations of the price of crude oil is pushing the oil companies to increase the investments in seismic exploration of new oil and gas reservoir. Seismic explor...
Stefano Savazzi, Umberto Spagnolini
ACSW
2006
13 years 9 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
CISS
2007
IEEE
14 years 2 months ago
High-Throughput Cooperative Communications with Complex Field Network Coding
Relay-based cooperative communications can achieve spatial diversity gains, enhance coverage and potentially increase capacity. If considered for large networks, traditional relayi...
Tairan Wang, Georgios B. Giannakis