Sciweavers

4189 search results - page 666 / 838
» On the Security of Wireless Sensor Networks
Sort
View
IJIT
2004
15 years 1 days ago
Enhance Performance of Secure Image Using Wavelet Compression
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication ...
Goh Han Keat, Azman Samsudin, Zurinahni Zainol
SENSYS
2009
ACM
15 years 5 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
PERCOM
2008
ACM
15 years 10 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
INFOSECCD
2006
ACM
15 years 4 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
PIMRC
2008
IEEE
15 years 5 months ago
Concurrent and parallel transmissions are optimal for low data-rate IR-UWB networks
— The Internet of Things, emerging pervasive and sensor networks are low data-rate wireless networks with, a priori, no specific topology and no fixed infrastructure. Their pri...
Jean-Yves Le Boudec, Ruben Merz