Sciweavers

13007 search results - page 2564 / 2602
» Wireless and Mobile Networking
Sort
View
WISEC
2010
ACM
14 years 3 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
PERCOM
2009
ACM
14 years 3 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
CCS
2009
ACM
14 years 3 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
ICCSA
2009
Springer
14 years 3 months ago
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems
Supporting multimedia traffic is one of the major challenges for the next generation of wireless personal area networks (WPANs). Especially, the IEEE 802.15.4 WPAN standards specif...
Junwoo Jung, Hoki Baek, Jaesung Lim
ICC
2009
IEEE
103views Communications» more  ICC 2009»
14 years 3 months ago
Optimization of Split-And-Combine Relaying
Relays play an important role for increasing rate and reducing energy consumption of wireless networks. In this paper we consider a three-node network (source, relay, destination)...
Raymond Yim, Andreas F. Molisch, Jinyun Zhang
« Prev « First page 2564 / 2602 Last » Next »