Sciweavers

2099 search results - page 358 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
ICISC
2008
129views Cryptology» more  ICISC 2008»
14 years 11 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
APCHI
2004
IEEE
15 years 1 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 3 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
CCR
2010
97views more  CCR 2010»
14 years 7 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
MOBICOM
2006
ACM
15 years 3 months ago
Electromagnetic communications within swarms of autonomous underwater vehicles
Autonomous underwater vehicles (AUVs) have great value as platforms for sensors. While traditional AUVs have been large platforms that tend to operate alone or in very small group...
Michael R. Frater, Michael J. Ryan, Robin M. Dunba...