Sciweavers

2507 search results - page 379 / 502
» Wireless Network Information Flow
Sort
View
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
CSREASAM
2009
15 years 4 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
130
Voted
PERCOM
2004
ACM
16 years 3 months ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
114
Voted
SAINT
2005
IEEE
15 years 9 months ago
The Simplicity Project: Architecture Concept
The research community is working towards a new allencompassing vision of the Internet. This vision certainly includes powerful transport and switching technologies, wireless netw...
Nicola Blefari-Melazzi, Wolfgang Kellerer, Chie No...
IWCMC
2009
ACM
15 years 10 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...