Sciweavers

4189 search results - page 712 / 838
» On the Security of Wireless Sensor Networks
Sort
View
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
14 years 10 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
15 years 4 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
CSREAPSC
2006
14 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
PERCOM
2007
ACM
15 years 4 months ago
Sensor Web Design Studies for Realtime Dynamic Congestion Pricing
Traffic Congestion is a multi-billion dollar national problem and worsening every year with population growth and increase in freight traffic. We present a model for realistic s...
Milton Halem, Anand Patwardhan, Sandor Dornbush, M...
MOBISYS
2007
ACM
15 years 9 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu