Sciweavers

4189 search results - page 754 / 838
» On the Security of Wireless Sensor Networks
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
MOBISYS
2005
ACM
15 years 9 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
PERCOM
2007
ACM
15 years 9 months ago
A Simple Model and Infrastructure for Context-Aware Browsing of the World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
PERCOM
2004
ACM
15 years 9 months ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
HYBRID
2003
Springer
15 years 3 months ago
Estimation of Distributed Hybrid Systems Using Particle Filtering Methods
Abstract. Networked embedded systems are composed of a large number of components that interact with the physical world via a set of sensors and actuators, have their own computati...
Xenofon D. Koutsoukos, James Kurien, Feng Zhao