Sciweavers

858 search results - page 74 / 172
» User Authentication in Sensor Networks
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
COMCOM
2007
129views more  COMCOM 2007»
14 years 10 months ago
Mobile object tracking in wireless sensor networks
— Wireless sensor network is an emerging technology that enables remote monitoring objects and environment. This paper proposes a protocol to track a mobile object in a sensor ne...
Hua-Wen Tsai, Chih-Ping Chu, Tzung-Shi Chen
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 4 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
UIST
2003
ACM
15 years 3 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley