Sciweavers

1482 search results - page 172 / 297
» Wireless LAN Security
Sort
View
128
Voted
SECPERU
2006
IEEE
15 years 7 months ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
148
Voted
WS
2006
ACM
15 years 7 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 8 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
ESORICS
2009
Springer
15 years 8 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 8 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003