Sciweavers

247 search results - page 43 / 50
» Protecting Receiver-Location Privacy in Wireless Sensor Netw...
Sort
View
ICPP
2008
IEEE
15 years 6 months ago
On the Reliability of Large-Scale Distributed Systems A Topological View
In large-scale, self-organized and distributed systems, such as peer-to-peer (P2P) overlays and wireless sensor networks (WSN), a small proportion of nodes are likely to be more c...
Yuan He, Hao Ren, Yunhao Liu, Baijian Yang
GLOBECOM
2010
IEEE
14 years 9 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
PERCOM
2007
ACM
15 years 11 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
PERCOM
2009
ACM
15 years 6 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
ICDCS
2008
IEEE
15 years 6 months ago
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living
Advances in networking, sensors, medical devices and smart phones have made it feasible to monitor and provide medical and other assistance to people either in their homes or outs...
Zheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou