Sciweavers

898 search results - page 144 / 180
» Wireless underground sensor networks: Research challenges
Sort
View
HOTOS
2007
IEEE
13 years 11 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
PERCOM
2006
ACM
14 years 7 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
PERCOM
2005
ACM
14 years 7 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...
NETWORK
2006
218views more  NETWORK 2006»
13 years 7 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
PERCOM
2009
ACM
14 years 2 months ago
On the Accuracy of RFID-based Localization in a Mobile Wireless Network Testbed
Abstract—The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2...
Vikram P. Munishwar, Shailendra Singh 0003, Xiaosh...