Sciweavers

271 search results - page 21 / 55
» Implementation and Evaluation of a Location-Aware Wireless M...
Sort
View
98
Voted
WISEC
2009
ACM
15 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
87
Voted
CCS
2006
ACM
15 years 1 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
61
Voted
COMSWARE
2007
IEEE
15 years 4 months ago
WiFiDump - A Novel Architecture for Wireless Network Debugging
— 802.11 usage has exploded and broken all barriers for which it was originally proposed. This has resulted in research for its non-legacy usages. Such usages require study of pa...
Abhijit Bagri, Mohit Mundhra, Abhinav Pathak, Bhas...
AINA
2008
IEEE
14 years 11 months ago
Disaster Communication Network by Combination of Different Wireless LANs
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
Kazuo Takahata, Shinya Takada, Yoshitaka Shibata
PERCOM
2009
ACM
15 years 10 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...