Personal computing devices are becoming more and more popular. These devices are able to collaborate with each other using wireless communication technologies, and then support many applications. Some interesting examples of these are healthcare, context-aware computing, and sports training. In any such applications, security is of vital importance. Firstly, sensitive personal data is always collected in these applications, thus confidentiality is usually required. Secondly, authenticity and integrity of data or instructions are always critical; incorrect data or instructions are not only useless, but also harmful in some cases. This thesis analyses the security requirements of personal networks, and develops a number of multi-channel sec...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in ...
This report provides a comprehensive view on the need for physical layer security. The security of ...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Network is a technology used to connect computers and devices together. They allow people the abilit...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
Abstract- the usage of wireless Networks have almost become inevitable for the human community. From...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper examines authentication protocols used for wireless communications, especially in the mul...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in ...
This report provides a comprehensive view on the need for physical layer security. The security of ...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Network is a technology used to connect computers and devices together. They allow people the abilit...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
Abstract- the usage of wireless Networks have almost become inevitable for the human community. From...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper examines authentication protocols used for wireless communications, especially in the mul...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in ...
This report provides a comprehensive view on the need for physical layer security. The security of ...