Sciweavers

4189 search results - page 593 / 838
» On the Security of Wireless Sensor Networks
Sort
View
99
Voted
ICOIN
2001
Springer
15 years 3 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
98
Voted
MOBISYS
2007
ACM
15 years 10 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
15 years 2 months ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad
85
Voted
WINET
2008
81views more  WINET 2008»
14 years 11 months ago
Interference power statistics in ad-hoc and sensor networks
Abstract There exist accurate calculation methods for estimation of interference power sum statistics in fixedtopology wireless networks based on the log-normal shadowing radio mod...
Ramin Hekmat, Piet Van Mieghem
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 4 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...