Sciweavers

2507 search results - page 379 / 502
» Wireless Network Information Flow
Sort
View
ESAS
2007
Springer
14 years 2 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
CSREASAM
2009
13 years 9 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
PERCOM
2004
ACM
14 years 7 months ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
SAINT
2005
IEEE
14 years 1 months ago
The Simplicity Project: Architecture Concept
The research community is working towards a new allencompassing vision of the Internet. This vision certainly includes powerful transport and switching technologies, wireless netw...
Nicola Blefari-Melazzi, Wolfgang Kellerer, Chie No...
IWCMC
2009
ACM
14 years 2 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...