Sciweavers

858 search results - page 83 / 172
» User Authentication in Sensor Networks
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
CLUSTER
2002
IEEE
15 years 2 months ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
DATE
2006
IEEE
157views Hardware» more  DATE 2006»
15 years 4 months ago
Modeling and simulation of mobile gateways interacting with wireless sensor networks
Sensor networks are emerging wireless technologies; their integration with the existing 2.5G, 3G mobile networks is a key issue to provide advanced services, e.g., health control....
Franco Fummi, Davide Quaglia, Fabio Ricciato, Maur...
TRIDENTCOM
2008
IEEE
15 years 4 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
ISSA
2008
14 years 11 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche