Sciweavers

1150 search results - page 21 / 230
» Beacon Based Authentication
Sort
View
26
Voted
ICICS
2005
Springer
14 years 1 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
ICASSP
2009
IEEE
14 years 2 months ago
Ranging energy optimization for robust sensor positioning
We address ranging energy optimization for an unsynchronized localization system, which features robust sensor positioning, in the sense that specific accuracy requirements are f...
Tao Wang, Geert Leus, Dries Neirynck, Feng Shu, Li...
IEEECIT
2006
IEEE
14 years 1 months ago
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks
Localization is a basic and critical requirement for wireless sensor network applications, e.g. target tracking, monitoring and intrusion detection. In the received signal strengt...
Haoran Feng, Ruixi Yuan, Chundi Mu
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 5 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
ALGOSENSORS
2008
Springer
13 years 9 months ago
Algorithms for Location Estimation Based on RSSI Sampling
In this paper, we re-examine the RSSI measurement model for location estimation and provide the first detailed formulation of the probability distribution of the position of a sens...
Charalampos Papamanthou, Franco P. Preparata, Robe...