Sciweavers

634 search results - page 78 / 127
» Secure time synchronization service for sensor networks
Sort
View
SAC
2003
ACM
15 years 3 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer
WMASH
2003
ACM
15 years 3 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
ICPADS
2008
IEEE
15 years 4 months ago
UDB: Using Directional Beacons for Localization in Underwater Sensor Networks
Underwater Sensor Networks (UWSN) are widely used in many applications, such as oceanic resource exploration, pollution monitoring, tsunami warnings and mine reconnaissance. In UW...
Hanjiang Luo, Yiyang Zhao, Zhongwen Guo, Siyuan Li...
WORDS
2005
IEEE
15 years 3 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh