Sciweavers

182 search results - page 35 / 37
» Robust key establishment in sensor networks
Sort
View
WISEC
2009
ACM
14 years 1 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
SIAMADS
2010
100views more  SIAMADS 2010»
13 years 1 months ago
Optimal Intrinsic Dynamics for Bursting in a Three-Cell Network
Previous numerical and analytical work has shown that synaptic coupling can allow a network of model neurons to synchronize despite heterogeneity in intrinsic parameter values. In ...
Justin R. Dunmyre, Jonathan E. Rubin
MOBISYS
2005
ACM
14 years 6 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
MOBICOM
2004
ACM
14 years 10 days ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...
IJCNN
2006
IEEE
14 years 28 days ago
Biologically Inspired KFLANN Place Fields for Robot Localization
– This paper presents a hippocampal inspired robot localization model that provides a means for a simple robotic platform with ultrasonic sensors to localize itself. There have b...
Alex Leng Phuan Tay