Sciweavers

402 search results - page 52 / 81
» Public key protocols for wireless communications
Sort
View
ESAS
2007
Springer
14 years 2 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
SIGCOMM
2012
ACM
11 years 10 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
GLOBECOM
2009
IEEE
14 years 2 months ago
On the Performance Gains of VoIP Aggregation and ROHC over a WirelessMAN-OFDMA Air Interface
—A growing number of mobile WiMAX deployments are in progress world-wide and the technology is anticipated to play a key role in next generation mobile broadband wireless network...
Jarno Pinola, Esa Piri, Kostas Pentikousis
GLOBECOM
2008
IEEE
14 years 2 months ago
Duty-Cycle Optimization in Unslotted 802.15.4 Wireless Sensor Networks
—We present a novel approach for minimizing the energy consumption of medium access control (MAC) protocols developed for duty-cycled wireless sensor networks (WSN) for the unslo...
Sinem Coleri Ergen, Carlo Fischione, Dimitri Maran...