Sciweavers

1129 search results - page 73 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
SENSYS
2009
ACM
15 years 4 months ago
Achieving range-free localization beyond connectivity
Wireless sensor networks have been proposed for many location-dependent applications. In such applications, the requirement of low system cost prohibits many range-based methods f...
Ziguo Zhong, Tian He
MIDDLEWARE
2004
Springer
15 years 3 months ago
A message-oriented middleware for sensor networks
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have a...
Eduardo Souto, Germano Guimarães, Glauco Va...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
AICT
2008
IEEE
15 years 4 months ago
Attaching an IMS Subscriber to an Unknown Foreign Network
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Seppo Heikkinen
ESCIENCE
2006
IEEE
15 years 4 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...