Sciweavers

287 search results - page 13 / 58
» An Information Security Strategy for Networkable Devices
Sort
View
81
Voted
SISW
2003
IEEE
15 years 2 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
ICASSP
2011
IEEE
14 years 1 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
INTERACT
2003
14 years 10 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
83
Voted
PERCOM
2007
ACM
15 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
55
Voted
LCN
2005
IEEE
15 years 3 months ago
Dynamic DiffServ Configuration Using COPS-PR
This paper presents a framework for managing dynamic Service Level Specification (SLS) in Differentiated Services (diffserv) networks. In the considered scenario, the configuratio...
André Beller, Edgard Jamhour, Manoel Camill...