Sciweavers

2047 search results - page 295 / 410
» Pervasive Computing on Active Networks
Sort
View
165
Voted
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
131
Voted
PERCOM
2007
ACM
16 years 4 months ago
Overhearing the Wireless Interface for 802.11-Based Positioning Systems
Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typ...
Thomas King, Thomas Haenselmann, Stephan Kopf, Wol...
PERCOM
2003
ACM
16 years 4 months ago
Location-Based E-Campus Web Services: From Design to Deployment
In our previous work, we have designed, using a network-based approach, and are currently deploying on Purdue wireless Infrastructure, a Web service for location discovery of 802....
Simon G. M. Koo, Catherine Rosenberg, Hoi-Ho Chan,...
141
Voted
FGCN
2008
IEEE
131views Communications» more  FGCN 2008»
15 years 11 months ago
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking
A mobile robot with various types of sensors via ubiquitous networks is introduced. We designed a mobile robot composed of TCP/IP network, wireless camera and several sensors in a...
Sanghoon Kim, Sangmu Lee, Seungjong Kim
CN
2007
90views more  CN 2007»
15 years 4 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos