Sciweavers

402 search results - page 41 / 81
» Public key protocols for wireless communications
Sort
View
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 2 months ago
Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study
—In wireless networks where communications are made over a shared medium, interference and collisions are the primary causes of packet drops. In multi-hop networks such as wirele...
Wonho Kim, Jeongkeun Lee, Taekyoung Kwon, Sung-Ju ...
CCS
2008
ACM
13 years 10 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
INTERACT
2003
13 years 9 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
TCS
2008
13 years 8 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...