Sciweavers

1087 search results - page 195 / 218
» Secure Tracking in Sensor Networks
Sort
View
ICRA
2005
IEEE
217views Robotics» more  ICRA 2005»
15 years 3 months ago
Development of an Autonomous Mobile Surveillance System Using a Network-based RTK-GPS
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...
ACSAC
2007
IEEE
15 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
105
Voted
ESAS
2007
Springer
15 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
80
Voted
INTERACT
2003
14 years 11 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
CIIA
2009
14 years 10 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti