Sciweavers

6122 search results - page 1163 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...
TPDS
2008
115views more  TPDS 2008»
13 years 8 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
SECON
2010
IEEE
13 years 6 months ago
Leveraging Cognitive Radios for Effective Communications over Water
Wireless communications over water may suffer from serious multipath fading due to strong specular reflections from conducting water surfaces. Cognitive radios enable dynamic spect...
Jian Tang, Li Zhang, Richard S. Wolff, Weiyi Zhang
IJWMC
2010
103views more  IJWMC 2010»
13 years 6 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
« Prev « First page 1163 / 1225 Last » Next »