Results 1 - 10
of
13,390
Manual authentication for wireless devices
- RSA Cryptobytes
, 2004
"... Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following proce ..."
Abstract
-
Cited by 108 (4 self)
- Add to MetaCart
Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following
Personalized Portal for Wireless Devices
- Proceedings of the 10th International World Wide Web Conference (WWW’10) Hong Kong, May 2001 (ACM, Hong Kong
"... for Wireless devices such as mobile phones or PDAs, which are characterized by small sized display, small memory, low power, and low bandwidth access. The industry has developed Wireless Application Protocol (WAP), a standard that specifies the application framework and network protocols for wireles ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
for Wireless devices such as mobile phones or PDAs, which are characterized by small sized display, small memory, low power, and low bandwidth access. The industry has developed Wireless Application Protocol (WAP), a standard that specifies the application framework and network protocols
Secure positioning of wireless devices with application to sensor networks
- in Proceedings of INFOCOM 2005
"... Abstract — So far, the problem of positioning in wireless net-works has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, th ..."
Abstract
-
Cited by 180 (12 self)
- Add to MetaCart
Abstract — So far, the problem of positioning in wireless net-works has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices
GAME DESIGN FOR WIRELESS DEVICES
"... The present article describes the current status of wireless games and goes on to discuss conceptual aspects of wireless game design, showing design “rules ” and real solutions to try to solve the several restrictions that the wireless devices and technology present to the game developer. This work ..."
Abstract
- Add to MetaCart
The present article describes the current status of wireless games and goes on to discuss conceptual aspects of wireless game design, showing design “rules ” and real solutions to try to solve the several restrictions that the wireless devices and technology present to the game developer. This work
Pgp in constrained wireless devices
- IN PROCEEDINGS OF THE 9TH USENIX SECURITY SYMPOSIUM
, 2000
"... ..."
Wireless device identification with radiometric signatures
- in Proceedings of the 14th ACM international conference on mobile computing and networking, ser. MobiCom ’08
"... We design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This technique, called PARADIS, leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present ..."
Abstract
-
Cited by 111 (4 self)
- Add to MetaCart
and are present even in otherwise identical NICs. These imperfections are transmitter-specific and manifest themselves as artifacts of the emitted signals. In PARADIS, we measure differentiating artifacts of individual wireless frames in the modulation domain, apply suitable machine-learning classification tools
Biometric Security For Wireless Device
"... Despite the work being done to secure the air link portion of wireless communications, user devices remain a the weak spot. Improving the security features built into handheld devices such as smart phones and wireless PDAs will help to convince business and enterprise users to adopt wireless data. T ..."
Abstract
- Add to MetaCart
Despite the work being done to secure the air link portion of wireless communications, user devices remain a the weak spot. Improving the security features built into handheld devices such as smart phones and wireless PDAs will help to convince business and enterprise users to adopt wireless data
between Wireless Devices
, 2002
"... secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does no ..."
Abstract
- Add to MetaCart
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does
Wireless Device for Patient Monitoring
"... Abstract — The increasing request of patients, suffering of chronic diseases, who wish to stay at home rather then in a hospital and also the increasing need of homecare monitoring for elderly people, have lead to a high demand of wearable medical devices. Also, extended patient monitoring during no ..."
Abstract
- Add to MetaCart
. This approach allows the patient to move unconstraint around an area, city or country. In this paper the design of ultra low power wireless monitoring devices based on ultra low power circuits, high storage memory flash, bluetooth communication and the firmware for the management of the monitoring device
Comparative Analysis of Wireless Devices
"... Abstract—In this paper, we attempt to compare the quality of communication wireless equipment manufactured by different vendors. A range of smart devices operating in the various standards are available on the market today. Special attention is paid to the WiFi standard as the most popular and affor ..."
Abstract
- Add to MetaCart
Abstract—In this paper, we attempt to compare the quality of communication wireless equipment manufactured by different vendors. A range of smart devices operating in the various standards are available on the market today. Special attention is paid to the WiFi standard as the most popular
Results 1 - 10
of
13,390