Sciweavers

1482 search results - page 266 / 297
» Wireless LAN Security
Sort
View
73
Voted
RTAS
1996
IEEE
15 years 1 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
137
Voted
ESAS
2007
Springer
15 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
GPC
2007
Springer
15 years 1 months ago
Bio-inspired Grid Information System with Epidemic Tuning
g Service Oriented Abstractions for the Wireless Sensor Grid Edgardo Aviles-Lopez, J. Antonio Garcia-Macias Implementation of OSD Security Framework and Credential Cache Gu Su Kim,...
Agostino Forestiero, Carlo Mastroianni, Fausto Pup...
97
Voted
CSREASAM
2006
14 years 11 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
77
Voted
TPDS
2010
99views more  TPDS 2010»
14 years 8 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li