Sciweavers

34 search results - page 3 / 7
» ws 2006
Sort
View
WS
2006
ACM
13 years 11 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
WS
2006
ACM
13 years 11 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
MSCS
2006
85views more  MSCS 2006»
13 years 5 months ago
On sequential functionals of type 3
We show that the extensional ordering of the sequential functionals of pure type 3, e.g. as defined via game semantics [2, 4], is not cpo-enriched. ws that this model does not equ...
Dag Normann
SIBGRAPI
2006
IEEE
13 years 11 months ago
Duality between the Watershed by Image Foresting Transform and the Fuzzy Connectedness Segmentation Approaches
This paper makes a rereading of two successful image segmentation approaches, the fuzzy connectedness (FC) and the watershed (WS) approaches, by analyzing both by means of the Ima...
Romaric Audigier, Roberto de Alencar Lotufo
WS
2006
ACM
13 years 11 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel