Sciweavers

6122 search results - page 1054 / 1225
» Securing network access in wireless sensor networks
Sort
View
94
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
87
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
103
Voted
ISSA
2008
14 years 11 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
88
Voted
MOBISYS
2009
ACM
15 years 10 months ago
Sensor selection for energy-efficient ambulatory medical monitoring
Epilepsy affects over three million Americans of all ages. Despite recent advances, more than 20% of individuals with epilepsy never achieve adequate control of their seizures. Th...
Eugene Shih, Ali H. Shoeb, John V. Guttag
76
Voted
ICN
2009
Springer
15 years 4 months ago
Impact of Handover on VoIP Speech Quality in WiMAX Networks
— VoIP is one of the most emerging technologies in the area of speech communications. VoIP is widely deployed in fixed line access networks. However, user’s requirements on the...
Zdenek Becvar, Pavel Mach, Robert Bestak
« Prev « First page 1054 / 1225 Last » Next »