Sciweavers

1051 search results - page 161 / 211
» Secure Continuity for Sensor Networks
Sort
View
102
Voted
CCS
2006
ACM
15 years 6 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
WIS
2004
15 years 4 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
128
Voted
SASN
2005
ACM
15 years 8 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
CASES
2006
ACM
15 years 9 months ago
A case study of multi-threading in the embedded space
The continuing miniaturization of technology coupled with wireless networks has made it feasible to physically embed sensor network systems into the environment. Sensor net proces...
Greg Hoover, Forrest Brewer, Timothy Sherwood
DCOSS
2011
Springer
14 years 2 months ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson