Sciweavers

172 search results - page 18 / 35
» A Secure Agent Architecture for Sensor Networks
Sort
View
PET
2004
Springer
15 years 2 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
SIGPRO
2008
90views more  SIGPRO 2008»
14 years 9 months ago
Some aspects of DOA estimation using a network of blind sensors
Recently, the DOA (Direction Of Arrival) estimation of an acoustic wavefront has been considered in a setting where the inference task is performed by a Wireless Sensor Network (W...
Marco Guerriero, Stefano Maranò, Vincenzo M...
ITNG
2008
IEEE
15 years 3 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
IJSN
2006
116views more  IJSN 2006»
14 years 9 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
99
Voted
MOBILIGHT
2010
14 years 4 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...