Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IJIPT
2010
147views more  IJIPT 2010»
12 years 13 days ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
ICPPW
2009
IEEE
12 years 8 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
BSN
2009
IEEE
307views Sensor Networks» more  BSN 2009»
12 years 8 months ago
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
—Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors in BAN have to be energy...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
books