Sciweavers

10 search results - page 2 / 2
» A Scheme for Testing Privacy State in Pervasive Sensor Netwo...
Sort
View
INFOCOM
2008
IEEE
13 years 11 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
EAAI
2008
116views more  EAAI 2008»
13 years 5 months ago
Robust neuro-identification of nonlinear plants in electric power systems with missing sensor measurements
Fault tolerant measurements are an essential requirement for system identification, control and protection. Measurements can be corrupted or interrupted due to sensor failure, bro...
Wei Qiao, Zhi Gao, Ronald G. Harley, Ganesh K. Ven...
JSAC
2010
214views more  JSAC 2010»
13 years 3 months ago
IEEE 802.15.5 WPAN mesh standard-low rate part: Meshing the wireless sensor networks
—This paper introduces a new IEEE standard, IEEE 802.15.5,which provides mesh capability for wireless personal area network (WPAN) devices. The standard provides an architectural...
Myung J. Lee, Rui Zhang, Jianliang Zheng, Gahng-Se...
IPSN
2007
Springer
13 years 11 months ago
Beacon location service: a location service for point-to-point routing in wireless sensor networks
In this paper we present Beacon Location Service (BLS): a location service for beacon-based routing algorithms like Beacon Vector Routing (BVR) [8] and S4 [19] . The role of a loc...
Jorge Ortiz, Chris R. Baker, Daekyeong Moon, Rodri...
CCS
2010
ACM
13 years 5 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger