Sciweavers

1463 search results - page 263 / 293
» Securing Wireless Mesh Networks
Sort
View
TMC
2011
119views more  TMC 2011»
13 years 4 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
PERCOM
2005
ACM
14 years 8 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
PERCOM
2006
ACM
14 years 8 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
ACSC
2004
IEEE
14 years 24 days ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
CONEXT
2010
ACM
13 years 7 months ago
Enabling high-bandwidth vehicular content distribution
Abstract -- We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby acce...
Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang...