Sciweavers

949 search results - page 127 / 190
» Design methods for security and trust
Sort
View
WINET
2010
199views more  WINET 2010»
15 years 2 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
BIRTHDAY
2012
Springer
14 years 6 days ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
PSYCHNOLOGY
2008
112views more  PSYCHNOLOGY 2008»
15 years 3 months ago
Tags and the City
This paper analyzes the findings of a set of field studies that explored the use of near field communication (NFC) tags in a mixed reality environment for providing access to digi...
Minna Isomursu
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 11 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
INFOCOM
2011
IEEE
14 years 7 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi