Sciweavers

1423 search results - page 45 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
WIOPT
2005
IEEE
15 years 3 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
ICOIN
2007
Springer
15 years 4 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
ICDE
2005
IEEE
115views Database» more  ICDE 2005»
15 years 3 months ago
Provenance-Aware Sensor Data Storage
Abstract— Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data pre...
Jonathan Ledlie, Chaki Ng, David A. Holland
CAI
2005
Springer
14 years 9 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
JIPS
2006
110views more  JIPS 2006»
14 years 9 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...