Sciweavers

858 search results - page 48 / 172
» User Authentication in Sensor Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 4 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
MOBICOM
1996
ACM
15 years 2 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IMC
2009
ACM
15 years 4 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
TNC
2004
146views Education» more  TNC 2004»
14 years 11 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
SUTC
2010
IEEE
14 years 8 months ago
Effective Metadata Management in Federated Sensor Networks
—As sensor networks become increasingly popular, heterogeneous sensor networks are being interconnected into federated sensor networks and provide huge volumes of sensor data to ...
Hoyoung Jeung, Sofiane Sarni, Ioannis Paparrizos, ...