Sciweavers

1692 search results - page 288 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
14 years 11 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 5 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
ADHOCNETS
2009
Springer
14 years 9 months ago
Compressing MAC Headers on Shared Wireless Media
This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes coul...
Jesus Arango, Matthew Faulkner, Stephen Pink
GLOBECOM
2010
IEEE
14 years 9 months ago
Passively Controllable Smart Antennas
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 12 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan