Sciweavers

4189 search results - page 749 / 838
» On the Security of Wireless Sensor Networks
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Sensor Scheduling for Optimal Observability Using Estimation Entropy
We consider sensor scheduling as the optimal observability problem for partially observable Markov decision processes (POMDP). This model fits to the cases where a Markov process ...
Mohammad Rezaeian
PERCOM
2006
ACM
15 years 9 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
PERCOM
2004
ACM
15 years 9 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
ICOIN
2007
Springer
15 years 4 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ICCCN
2007
IEEE
15 years 1 months ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...