Sciweavers

402 search results - page 40 / 81
» Public key protocols for wireless communications
Sort
View
IMC
2007
ACM
13 years 9 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
MOBISYS
2011
ACM
12 years 11 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
13 years 12 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
PERCOM
2009
ACM
14 years 2 months ago
Persistent Content-based Information Dissemination in Hybrid Vehicular Networks
Abstract—Content-based information dissemination has a potential number of applications in vehicular networking, including advertising, traffic and parking notifications and em...
Ilias Leontiadis, Paolo Costa, Cecilia Mascolo
STOC
2004
ACM
152views Algorithms» more  STOC 2004»
14 years 8 months ago
Exponential separation of quantum and classical one-way communication complexity
Abstract. We give the first exponential separation between quantum and bounded-error randomized one-way communication complexity. Specifically, we define the Hidden Matching Proble...
Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis