Sciweavers

6122 search results - page 1090 / 1225
» Securing network access in wireless sensor networks
Sort
View
CSREASAM
2006
14 years 11 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
INFOCOM
2003
IEEE
15 years 3 months ago
Performance anomaly of 802.11b
— We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance ...
Gilles Berger-Sabbatel, Franck Rousseau, Martin He...
ICIP
2002
IEEE
15 years 11 months ago
Energy efficient wireless video communications for the digital set-top box
In the future, digital set -top boxes may serve as the primary access point for wireless home networks, enabling mobile us ers to use video conferencing as well as streaming appli...
Yiftach Eisenberg, Carlos E. Luna, Thrasyvoulos N....
SACMAT
2009
ACM
15 years 4 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
SIGCOMM
2010
ACM
14 years 10 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
« Prev « First page 1090 / 1225 Last » Next »