167 papers found
Refreshing results…
Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)
Easy Life, Intelligent Systems, and Life 2.0:European Research on ICT for Aging Adults
An Architectural Blueprint for a Real-World Internet
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices
System Capacity Limits Introduced by Data Fusion on Cooperative Spectrum Sensing under Correlated Environments
A layered algorithm for cooperative MBMS enhancement
Low Access Delay Anti-Collision Algorithm for Reader in RFID systems
Digital Image Forensics Using Multi-Resolution Histograms:
Network Management System for (FUTON-like) Radio-over-Fiber Infrastructure
D5.3 Reading reliability report:WP5 – Ubiquitous, added value sensing
Weaponizing Wireless Networks:An Attack Tool for Launching Attacks against Sensor Networks
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks
Detecting Wormholes in Wireless Sensor Networks
Cognitive radio spectrum management:sensing and sharing
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
ASPIRE: Added-value Sensing:Reliability and Middleware
ASPIRE: Added-value Sensing
Cooperative Opportunistic Large Array Approach for Cognitive Radio Networks
Security and Privacy in Mobile Information and Communication Systems : Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
Fuzzy-Logic Based Call Admission Control for a Heterogeneous Radio Environment
Missing publications? Read more about our data sources.