Sciweavers

10044 search results - page 85 / 2009
» Authentication in Wireless Networks
Sort
View
MOBIHOC
2003
ACM
15 years 10 months ago
Asynchronous wakeup for ad hoc networks
Rong Zheng, Jennifer C. Hou, Lui Sha
SASN
2006
ACM
15 years 5 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
NOSSDAV
2009
Springer
15 years 5 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda
ICANN
2007
Springer
15 years 3 months ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...