Sciweavers

6122 search results - page 1119 / 1225
» Securing network access in wireless sensor networks
Sort
View
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
15 years 6 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
GLOBECOM
2008
IEEE
15 years 4 months ago
Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs
— Failure-Rate Minimization is becoming one of the major design issues in wireless sensor network (WSN) architecture due to multiple available Functional-units (FUs). There is a ...
Meikang Qiu, Jing Deng, Edwin Hsing-Mean Sha
ICASSP
2009
IEEE
14 years 7 months ago
Fast mean square convergence of consensus algorithms in WSNs with random topologies
The average consensus in wireless sensor networks is achieved under assumptions of symmetric or balanced topology at every time instant. However, communication and/or node failure...
Silvana Silva Pereira, Alba Pagès-Zamora
« Prev « First page 1119 / 1225 Last » Next »