Sciweavers

125 search results - page 17 / 25
» Security Protocol for IEEE 802.11 Wireless Local Area Networ...
Sort
View
ICPADS
2005
IEEE
14 years 1 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
WMI
2001
147views more  WMI 2001»
13 years 8 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
GLOBECOM
2009
IEEE
14 years 2 months ago
Robust Cooperative Relaying in a Wireless LAN: Cross-Layer Design and Performance Analysis
—A key technology in cooperative communications is distributed space-time coding (DSTC) which achieves spatial diversity gain from multiple relays. A novel DSTC, called randomize...
Pei Liu, Chun Nie, Elza Erkip, Shivendra S. Panwar
WONS
2005
IEEE
14 years 1 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
SECON
2010
IEEE
13 years 5 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...