Sciweavers

1129 search results - page 137 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
14 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NETWORK
2008
150views more  NETWORK 2008»
14 years 10 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
CCR
1999
138views more  CCR 1999»
14 years 9 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
APNOMS
2007
Springer
15 years 4 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
DSOM
2003
Springer
15 years 3 months ago
Management Challenges of Context-Aware Services in Ubiquitous Environments
Ubiquitous environments facilitate the collection of information pieces from sensors, databases, or mobile devices in order to compose the context of entities like users, places, o...
Heinz-Gerd Hegering, Axel Küpper, Claudia Lin...