Sciweavers

270 search results - page 19 / 54
» Securing Wireless Networks in a University Environment
Sort
View
EUROPAR
2003
Springer
14 years 19 days ago
Short Message Service in a Grid-Enabled Computing Environment
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
Fenglian Xu, M. Hakki Eres, Simon J. Cox
MOBISYS
2011
ACM
12 years 10 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
SENSYS
2009
ACM
14 years 2 months ago
Wildlife and environmental monitoring using RFID and WSN technology
bstract: Wildlife and Environmental Monitoring using RFID and WSN Technology Vladimir Dyo1, Stephen A. Ellwood2, David W. Macdonald2, Andrew Markham3 Cecilia Mascolo4, Bence P´asz...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 7 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
COMCOM
2007
142views more  COMCOM 2007»
13 years 7 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...