Sciweavers

858 search results - page 130 / 172
» User Authentication in Sensor Networks
Sort
View
CCS
2009
ACM
15 years 4 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
CN
2007
77views more  CN 2007»
14 years 10 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
MOBICOM
2010
ACM
14 years 10 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
SUTC
2008
IEEE
15 years 4 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
WCNC
2008
IEEE
15 years 4 months ago
Combining Cricket System and Inertial Navigation for Indoor Human Tracking
—We present a system-level approach to localizing and tracking users on a basis of different sources of location information. We have applied a combination of the Cricket system ...
Michael Popa, Junaid Ansari, Janne Riihijärvi...