Sciweavers

233 search results - page 42 / 47
» Securing Cooperative Transmission in Wireless Communications
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu
COMCOM
2006
148views more  COMCOM 2006»
13 years 7 months ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
IWCMC
2009
ACM
14 years 2 months ago
Joint turbo equalization for relaying schemes over frequency-selective fading channels
We propose a single carrier joint frequency domain equalization and interference cancellation (FDE-IC) with diversity combining for different relaying schemes. We consider amplif...
Houda Chafnaji, Tarik Ait-Idir, Halim Yanikomerogl...
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
ISSA
2008
13 years 9 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche