Sciweavers

858 search results - page 56 / 172
» User Authentication in Sensor Networks
Sort
View
CSE
2009
IEEE
15 years 2 months ago
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol
—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource const...
Kunjan Patel, Lim Jong Chern, Chris J. Bleakley, W...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
15 years 10 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
AINA
2007
IEEE
15 years 1 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
CSREASAM
2006
14 years 11 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
TMC
2010
124views more  TMC 2010»
14 years 8 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...