Sciweavers

279 search results - page 23 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
SOCIALCOM
2010
13 years 5 months ago
Development of Communication Model for Social Robots Based on Mobile Service
This paper describes an interactive social agent platform which examines anthropomorphic robot features in the mobile phone usage context. Our system is smart phone based robot age...
Ji-Dong Yim, Sungkuk Chun, Keechul Jung, Christoph...
SPW
1999
Springer
14 years 8 days ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
DEBS
2007
ACM
13 years 12 months ago
Modeling the communication costs of content-based routing: the case of subscription forwarding
Content-based routing (CBR) provides the core distribution support of several middleware paradigms, most notably content-based publish-subscribe. Despite its popularity, however, ...
Stefano Castelli, Paolo Costa, Gian Pietro Picco
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 11 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...