Sciweavers

2099 search results - page 233 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
ICASSP
2009
IEEE
14 years 8 months ago
Distributed sampling and reconstruction of non-bandlimited fields in sensor networks based on shift-invariant spaces
We use the theory and algorithms developed for so-called shiftinvariant spaces to develop a novel distributed architecture for sampling and reconstructing non-bandlimited fields i...
Gunter Reise, Gerald Matz
SIGCOMM
1995
ACM
15 years 2 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
WWW
2008
ACM
15 years 11 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
PERCOM
2005
ACM
15 years 10 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
SENSYS
2006
ACM
15 years 4 months ago
Experimental study of concurrent transmission in wireless sensor networks
We undertake a systematic experimental study of the effects of concurrent packet transmissions in low-power wireless networks. Our measurements, conducted with Mica2 motes equippe...
Dongjin Son, Bhaskar Krishnamachari, John S. Heide...