Sciweavers

Share
24 search results - page 4 / 5
» Exploiting Empirical Engagement in Authentication Protocol D...
Sort
View
INFOCOM
2009
IEEE
10 years 5 months ago
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
AVSS
2008
IEEE
10 years 5 months ago
Multi-camera Control through Constraint Satisfaction for Persistent Surveillance
We introduce a distributed camera coalition formation scheme for perceptive scene coverage and persistent surveillance by smart camera sensor networks. The proposed model supports...
Faisal Z. Qureshi, Demetri Terzopoulos
GI
2004
Springer
10 years 4 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
RTSS
2009
IEEE
10 years 5 months ago
Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks
Abstract—Multi-channel design has received significant attention for low-power wireless networks (LWNs), such as 802.15.4-based wireless sensor networks, due to its potential of...
Guoliang Xing, Mo Sha, Jun Huang, Gang Zhou, Xiaor...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
10 years 5 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
books