Sciweavers

858 search results - page 110 / 172
» User Authentication in Sensor Networks
Sort
View
JSAC
2006
139views more  JSAC 2006»
14 years 10 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
ACSAC
2008
IEEE
14 years 10 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...
BSN
2009
IEEE
118views Sensor Networks» more  BSN 2009»
15 years 4 months ago
Smart Jacket Design for Neonatal Monitoring with Wearable Sensors
— Critically ill new born babies admitted at the Neonatal Intensive Care Unit (NICU) are extremely tiny and vulnerable to external disturbance. Smart Jacket proposed in this pape...
Sibrecht Bouwstra, Wei Chen, Loe M. G. Feijs, Sida...
TRIDENTCOM
2010
IEEE
14 years 7 months ago
From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics
Abstract. This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end exper...
Mukundan Sridharan, Wenjie Zeng, William Leal, Xi ...
DEBU
2006
163views more  DEBU 2006»
14 years 10 months ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...