Sciweavers

1423 search results - page 174 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 10 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
PDCAT
2005
Springer
15 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
IPSN
2004
Springer
15 years 3 months ago
An energy-aware data-centric generic utility based approach in wireless sensor networks
Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and energyconstrained in nature. In this paper, formulate t...
Wei-Peng Chen, Lui Sha
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
15 years 4 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...