Sciweavers

402 search results - page 77 / 81
» Public key protocols for wireless communications
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
VTC
2007
IEEE
14 years 2 months ago
Opportunistic Relay Selection with Limited Feedback
Abstract— It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless net...
Caleb K. Lo, Robert W. Heath Jr., Sriram Vishwanat...
ACSAC
2006
IEEE
14 years 2 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
VTC
2006
IEEE
152views Communications» more  VTC 2006»
14 years 1 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
WWIC
2004
Springer
124views Communications» more  WWIC 2004»
14 years 1 months ago
Mobility-Aware Rendezvous Point for Mobile Multicast Sources
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdel...