Sciweavers

1748 search results - page 190 / 350
» Security Models for Heterogeneous Networking
Sort
View
COOPIS
2002
IEEE
15 years 9 months ago
Composing and Deploying Grid Middleware Web Services Using Model Driven Architecture
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of complex grid applications, such as large-scale distributed co...
Aniruddha S. Gokhale, Balachandran Natarajan
DCOSS
2010
Springer
15 years 4 months ago
Design and Implementation of a Robust Sensor Data Fusion System for Unknown Signals
In this work, we present a robust sensor fusion system for exploratory data collection, exploiting the spatial redundancy in sensor networks. Unlike prior work, our system design c...
Younghun Kim, Thomas Schmid, Mani B. Srivastava
ESORICS
2011
Springer
14 years 3 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
PERCOM
2010
ACM
15 years 2 months ago
Towards ontology-driven development of applications for smart environments
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
Artem Katasonov, Marko Palviainen
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong