Sciweavers

881 search results - page 102 / 177
» connection 2004
Sort
View
ESORICS
2004
Springer
15 years 10 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
ICCSA
2004
Springer
15 years 10 months ago
Searching for 2D Spatial Network Holes
Research involving different forms of networks, such as internet networks, social networks, and cellular networks, has increasingly become an important field of study. From this wo...
Femke Reitsma, Shane Engel
ISCIS
2004
Springer
15 years 10 months ago
Relay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Albert Levi, Erhan Çetintas, Murat Aydos, &...
MIDDLEWARE
2004
Springer
15 years 10 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
CIARP
2004
Springer
15 years 11 months ago
Speaker Verification Using Coded Speech
Abstract. The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the cod...
Antonio Moreno-Daniel, Biing-Hwang Juang, Juan Art...