Sciweavers

2099 search results - page 275 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
DSN
2005
IEEE
15 years 4 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
102
Voted
IJWMC
2007
103views more  IJWMC 2007»
14 years 11 months ago
Interworking of 3G cellular networks and wireless LANs
: The Third Generation (3G) cellular networks provide ubiquitous connectivity but low data rates, whereas Wireless Local Area Networks (WLANs) can offer much higher data rates but ...
Wei Song, Weihua Zhuang, Aladdin Saleh
APNOMS
2006
Springer
15 years 2 months ago
Delivery and Storage Architecture for Sensed Information Using SNMP
Many researches on context aware computing are carried out around the world. Among them, Context-Toolkit and Semantic Space provide separation of concerns between sensor and applic...
Deokjai Choi, Hongseok Jang, Kugsang Jeong, Punghy...
MOBICOM
2006
ACM
15 years 5 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
73
Voted
ACISP
2003
Springer
15 years 4 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell