• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,390
Next 10 →

Manual authentication for wireless devices

by Christian Gehrmann, Kaisa Nyberg - RSA Cryptobytes , 2004
"... Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following proce ..."
Abstract - Cited by 108 (4 self) - Add to MetaCart
Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following

Personalized Portal for Wireless Devices

by K. Maly, M. Zubair - Proceedings of the 10th International World Wide Web Conference (WWW’10) Hong Kong, May 2001 (ACM, Hong Kong
"... for Wireless devices such as mobile phones or PDAs, which are characterized by small sized display, small memory, low power, and low bandwidth access. The industry has developed Wireless Application Protocol (WAP), a standard that specifies the application framework and network protocols for wireles ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
for Wireless devices such as mobile phones or PDAs, which are characterized by small sized display, small memory, low power, and low bandwidth access. The industry has developed Wireless Application Protocol (WAP), a standard that specifies the application framework and network protocols

Secure positioning of wireless devices with application to sensor networks

by Jean-pierre Hubaux - in Proceedings of INFOCOM 2005
"... Abstract — So far, the problem of positioning in wireless net-works has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, th ..."
Abstract - Cited by 180 (12 self) - Add to MetaCart
Abstract — So far, the problem of positioning in wireless net-works has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices

GAME DESIGN FOR WIRELESS DEVICES

by unknown authors
"... The present article describes the current status of wireless games and goes on to discuss conceptual aspects of wireless game design, showing design “rules ” and real solutions to try to solve the several restrictions that the wireless devices and technology present to the game developer. This work ..."
Abstract - Add to MetaCart
The present article describes the current status of wireless games and goes on to discuss conceptual aspects of wireless game design, showing design “rules ” and real solutions to try to solve the several restrictions that the wireless devices and technology present to the game developer. This work

Pgp in constrained wireless devices

by Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, Alfred Menezes - IN PROCEEDINGS OF THE 9TH USENIX SECURITY SYMPOSIUM , 2000
"... ..."
Abstract - Cited by 35 (2 self) - Add to MetaCart
Abstract not found

Wireless device identification with radiometric signatures

by Vladimir Brik, Suman Banerjee, Marco Gruteser - in Proceedings of the 14th ACM international conference on mobile computing and networking, ser. MobiCom ’08
"... We design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This technique, called PARADIS, leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present ..."
Abstract - Cited by 111 (4 self) - Add to MetaCart
and are present even in otherwise identical NICs. These imperfections are transmitter-specific and manifest themselves as artifacts of the emitted signals. In PARADIS, we measure differentiating artifacts of individual wireless frames in the modulation domain, apply suitable machine-learning classification tools

Biometric Security For Wireless Device

by Tim Kridel
"... Despite the work being done to secure the air link portion of wireless communications, user devices remain a the weak spot. Improving the security features built into handheld devices such as smart phones and wireless PDAs will help to convince business and enterprise users to adopt wireless data. T ..."
Abstract - Add to MetaCart
Despite the work being done to secure the air link portion of wireless communications, user devices remain a the weak spot. Improving the security features built into handheld devices such as smart phones and wireless PDAs will help to convince business and enterprise users to adopt wireless data

between Wireless Devices

by Tim Kindberg, Kan Zhang , 2002
"... secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does no ..."
Abstract - Add to MetaCart
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does

Wireless Device for Patient Monitoring

by Robert G. Lupu, Andrei Stan, Florina Ungureanu
"... Abstract — The increasing request of patients, suffering of chronic diseases, who wish to stay at home rather then in a hospital and also the increasing need of homecare monitoring for elderly people, have lead to a high demand of wearable medical devices. Also, extended patient monitoring during no ..."
Abstract - Add to MetaCart
. This approach allows the patient to move unconstraint around an area, city or country. In this paper the design of ultra low power wireless monitoring devices based on ultra low power circuits, high storage memory flash, bluetooth communication and the firmware for the management of the monitoring device

Comparative Analysis of Wireless Devices

by Maria Astrakhantceva, Andrei Sukhov
"... Abstract—In this paper, we attempt to compare the quality of communication wireless equipment manufactured by different vendors. A range of smart devices operating in the various standards are available on the market today. Special attention is paid to the WiFi standard as the most popular and affor ..."
Abstract - Add to MetaCart
Abstract—In this paper, we attempt to compare the quality of communication wireless equipment manufactured by different vendors. A range of smart devices operating in the various standards are available on the market today. Special attention is paid to the WiFi standard as the most popular
Next 10 →
Results 1 - 10 of 13,390
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University