Sciweavers

1051 search results - page 180 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 6 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
APCHI
2004
IEEE
15 years 3 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
16 years 1 months ago
GADT: A Probability Space ADT for Representing and Querying the Physical World
Large sensor networks are being widely deployed for measurement, detection, and monitoring applications. Many of these applications involve database systems to store and process d...
Anton Faradjian, Johannes Gehrke, Philippe Bonnet
EDBT
2006
ACM
114views Database» more  EDBT 2006»
15 years 12 months ago
Resource Adaptive Periodicity Estimation of Streaming Data
Abstract. Streaming environments typically dictate incomplete or approximate algorithm execution, in order to cope with sudden surges in the data rate. Such limitations are even mo...
Michail Vlachos, Deepak S. Turaga, Philip S. Yu