Sciweavers

858 search results - page 75 / 172
» User Authentication in Sensor Networks
Sort
View
CCS
2005
ACM
15 years 3 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
VLDB
2004
ACM
106views Database» more  VLDB 2004»
15 years 3 months ago
An Integration Framework for Sensor Networks and Data Stream Management Systems
This demonstration shows an integrated query processing environment where users can seamlessly query both a data stream management system and a sensor network with one query expre...
Daniel J. Abadi, Wolfgang Lindner, Samuel Madden, ...
WS
2004
ACM
15 years 3 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
CCS
2008
ACM
14 years 12 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
TITB
2010
181views Education» more  TITB 2010»
14 years 4 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...