Sciweavers

270 search results - page 20 / 54
» Securing Wireless Networks in a University Environment
Sort
View
CATA
2007
13 years 11 months ago
Wireless Sensor Payload Design for Sounding Rocket
A quick turnaround Sub-Orbital Student Experiment Module sounding rocket experiment has been designed and built to initiate the Old Dominion University wireless spacecraft bus pro...
Sachin Shetty, Min Song, Robert Ash, Ersin Ancel, ...
COMCOM
2006
148views more  COMCOM 2006»
13 years 9 months ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
CCS
2005
ACM
14 years 3 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
PERCOM
2007
ACM
14 years 9 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer
JSAC
2006
136views more  JSAC 2006»
13 years 9 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas