Sciweavers

858 search results - page 49 / 172
» User Authentication in Sensor Networks
Sort
View
MOBICOM
2012
ACM
13 years 10 days ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
TIM
2011
183views more  TIM 2011»
14 years 4 months ago
Calibration and Field Deployment of Low-Cost Fluid Flow-Rate Sensors Using a Wireless Network
—Low-cost networked fluid flow velocity sensors are needed for high-density sampling in environmental research and other applications requiring automated fluid flow velocity mapp...
C. K. Harnett, M. T. Schueler, N. R. Blumenthal, K...
AINA
2004
IEEE
15 years 1 months ago
An Access Control Model Based on Distributed Knowledge Management
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...
Alexandr Seleznyov, Stephen Hailes
BROADNETS
2006
IEEE
15 years 4 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
ICDCSW
2005
IEEE
15 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...