Sciweavers

1165 search results - page 220 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
90
Voted
ICCCN
2008
IEEE
15 years 3 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 3 months ago
On The Rate-Distance Adaptability of Slotted Aloha
—In wireless communication systems, the signal strength/quality generally varies with the distances between transmitters and receivers. As a consequence, the throughput in the MA...
Chih-Cheng Tseng, Shao-Yu Lien, Kwang-Cheng Chen, ...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 3 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
SIGCOMM
2012
ACM
12 years 12 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
81
Voted
SAC
2009
ACM
15 years 4 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni