Results 1 - 10
of
4,546
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
, 2003
"... Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of ..."
Abstract
-
Cited by 311 (5 self)
- Add to MetaCart
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy
RFID security and privacy: A research survey
- ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008
, 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract
-
Cited by 353 (6 self)
- Add to MetaCart
Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next
Cooperative sensing among cognitive radios
- In Proc. of the IEEE International Conference on Communications (ICC
, 2006
"... Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might f ..."
Abstract
-
Cited by 289 (15 self)
- Add to MetaCart
Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might
Achievable Rates in Cognitive Radio Channels
- IEEE Trans. Inf. Theory
, 2006
"... Cognitive radio promises a low cost, highly flexible alternative to the classic single frequency band, single protocol wireless device. By sensing and adapting to its environment, such a device is able to fill voids in the wireless spectrum and dramatically increase spectral efficiency. In this pape ..."
Abstract
-
Cited by 274 (46 self)
- Add to MetaCart
Cognitive radio promises a low cost, highly flexible alternative to the classic single frequency band, single protocol wireless device. By sensing and adapting to its environment, such a device is able to fill voids in the wireless spectrum and dramatically increase spectral efficiency
Topology Control in Wireless Ad Hoc and Sensor Networks
- ACM Computing Surveys
, 2005
"... Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of thi ..."
Abstract
-
Cited by 304 (4 self)
- Add to MetaCart
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal
Optimum Combining in Digital Mobile Radio with Cochannel Interference
- IEEE JSAC
, 1984
"... Abstract-This paper studies optimum signal combining for space diver-sity reception in cellular mobile radio systems. With optimum combining, the signals received by the antennas are weighted and combined to maxi-mize the output signal-to-interference-plus-noise ratio. Thus, with cochan-ne1 interfe ..."
Abstract
-
Cited by 200 (3 self)
- Add to MetaCart
Abstract-This paper studies optimum signal combining for space diver-sity reception in cellular mobile radio systems. With optimum combining, the signals received by the antennas are weighted and combined to maxi-mize the output signal-to-interference-plus-noise ratio. Thus, with cochan-ne1
On the Performance of Ad Hoc Networks with Beamforming Antennas
- ACM MobiHoc
, 2001
"... Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the reduced interference that beamforming antennas can provide. We consider a number o ..."
Abstract
-
Cited by 287 (6 self)
- Add to MetaCart
Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the reduced interference that beamforming antennas can provide. We consider a number
The feasibility of launching and detecting jamming attacks in wireless networks
- In ACM MOBIHOC
, 2005
"... Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with th ..."
Abstract
-
Cited by 265 (15 self)
- Add to MetaCart
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere
Radio frequency interference mitigation on the Very Small Array
, 2009
"... This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in All Theses and Dissertations by an ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in All Theses and Dissertations by an
Results 1 - 10
of
4,546