Sciweavers

1635 search results - page 322 / 327
» A lightweight secure protocol for wireless sensor networks
Sort
View
ESAS
2004
Springer
14 years 1 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
ICDCSW
2002
IEEE
14 years 1 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
CHI
2005
ACM
13 years 10 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
ENTCS
2007
158views more  ENTCS 2007»
13 years 8 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
PERCOM
2010
ACM
13 years 6 months ago
Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms
Abstract—Bringing heterogeneous devices like industrial machines, home appliances, and wireless sensors into the Web assumes the usage of well-defined standards and protocols. O...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...