Sciweavers

1692 search results - page 285 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
IJRFITA
2007
114views more  IJRFITA 2007»
14 years 11 months ago
Semi-passive RFID and beyond: steps towards automated quality tracing in the food chain
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
Reiner Jedermann, Walter Lang
ISMAR
2003
IEEE
15 years 5 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
IWCMC
2006
ACM
15 years 5 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
GCC
2005
Springer
15 years 5 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...