Sciweavers

1051 search results - page 173 / 211
» Secure Continuity for Sensor Networks
Sort
View
MOR
2010
115views more  MOR 2010»
14 years 6 months ago
Directional Derivatives of Oblique Reflection Maps
Given an oblique reflection map and functions , Dlim (the space of functions that have left and right limits at every point), the directional derivative () of along , evaluate...
Avi Mandelbaum, Kavita Ramanan
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
16 years 1 months ago
Stream Monitoring under the Time Warping Distance
The goal of this paper is to monitor numerical streams, and to find subsequences that are similar to a given query sequence, under the DTW (Dynamic Time Warping) distance. Applica...
Yasushi Sakurai, Christos Faloutsos, Masashi Yamam...
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
15 years 29 days ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
ISI
2008
Springer
14 years 12 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
WS
2006
ACM
15 years 5 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton