Sciweavers

2560 search results - page 347 / 512
» Securing VO Management
Sort
View
157
Voted
COMCOM
2007
104views more  COMCOM 2007»
15 years 4 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
FTNET
2007
80views more  FTNET 2007»
15 years 4 months ago
Network Coding Applications
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology...
Christina Fragouli, Emina Soljanin
154
Voted
SCN
2008
Springer
15 years 4 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
166
Voted
DKE
2002
130views more  DKE 2002»
15 years 4 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
PAAMS
2010
Springer
15 years 2 months ago
Agents to Help Context-Aware System in Home Care
Context-aware systems capture information from the attributes located within their surroundings and deal with different ways of interacting with the user in its environment. This p...
Juan A. Fraile, Dante I. Tapia, Jesús A. Ro...