Sciweavers

868 search results - page 159 / 174
» Key Management in Wireless Sensor Networks
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni
78
Voted
PERCOM
2003
ACM
15 years 11 months ago
Dynamic Application Composition: Customizing the Behavior of an Active Space
The proliferation of wireless networks, hand-held PCs, touch panels, large flat displays, sensors, and embedded devices is transforming traditional habitats and living spaces into...
Brian Ziebart, Manuel Román, Roy H. Campbel...
MOBISYS
2005
ACM
15 years 11 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
SENSYS
2003
ACM
15 years 4 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin