Sciweavers

688 search results - page 130 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
WISEC
2009
ACM
15 years 6 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
98
Voted
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 11 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
IJSNET
2010
122views more  IJSNET 2010»
14 years 10 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
MOBISYS
2007
ACM
15 years 11 months ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 6 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin