Sciweavers

107 search results - page 5 / 22
» percom 2006
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
PERCOM
2006
ACM
15 years 3 months ago
Sensor Networks For Smart Roads
This paper proposes the use of a wireless sensor network of “cat’s eye” augmented with embedded processing, communication, and sensing capabilities to monitor vehicle behavi...
Marcin Karpinski, Aline Senart, Vinny Cahill
PERCOM
2006
ACM
15 years 9 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...
PERCOM
2006
ACM
15 years 9 months ago
Dependability and Accountability for Context-aware Middleware Systems
In this paper we present a framework to provide dependability through accountability. Our proposal exploits the asymmetry present in the majority of sensor data processing to chea...
Andrew C. Rice, Alastair R. Beresford
PERCOM
2006
ACM
15 years 9 months ago
Electronic Prescriptions: A Ubiquitous Solution using Jini
Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for thei...
Gheorghita Ghinea, Arash Moradi, Shervin Asgari, T...