Sciweavers

164 search results - page 29 / 33
» Bootstrapping of Peer-to-Peer Networks
Sort
View
TIFS
2010
130views more  TIFS 2010»
14 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
IROS
2008
IEEE
162views Robotics» more  IROS 2008»
15 years 3 months ago
WiFi position estimation in industrial environments using Gaussian processes
—The increased popularity of wireless networks has enabled the development of localization techniques that rely on WiFi signal strength. These systems are cheap, effective, and r...
Felix Duvallet, Ashley D. Tews
LCN
2007
IEEE
15 years 3 months ago
Investigation of IEEE 802.11k-based Access Point Coverage Area and Neighbor Discovery
— Possessing knowledge about access point coverage areas and neighbors is of essential need for the provisioning of, e.g., location based handovers or push services. A convenient...
Sven D. Hermann, Marc Emmelmann, O. Belaifa, Adam ...
ICIC
2007
Springer
15 years 3 months ago
Evolutionary Ensemble for In Silico Prediction of Ames Test Mutagenicity
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...
Huanhuan Chen, Xin Yao
IPPS
2006
IEEE
15 years 3 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...