Sciweavers

309 search results - page 49 / 62
» Secure Communication over Parallel Relay Channel
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
CISS
2011
IEEE
13 years 17 days ago
Characterizing multiplexing and diversity in visual MIMO
—Mobile optical wireless has so far been limited to very short ranges for high data rate systems. It may be feasible to overcome the data rate limitations over large transmission...
Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam,...
WIMOB
2008
IEEE
14 years 3 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan