Sciweavers

1118 search results - page 219 / 224
» Coverage area management for wireless sensor networks
Sort
View
CCS
2008
ACM
13 years 10 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
VLDB
2005
ACM
177views Database» more  VLDB 2005»
14 years 8 months ago
Indexing mobile objects using dual transformations
With the recent advances in wireless networks, embedded systems and GPS technology, databases that manage the location of moving objects have received increased interest. In this ...
George Kollios, Dimitris Papadopoulos, Dimitrios G...
ICC
2007
IEEE
184views Communications» more  ICC 2007»
14 years 2 months ago
A 3GPP-IMS Based Approach for Converging Next Generation Mobile Data Networks
— This paper presents a promising architecture for of the 3GPP’s IMS for supporting real-time session negotiation converging third-generation (3G) cellular data networks and an...
Kumudu S. Munasinghe, Abbas Jamalipour
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 8 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
JCST
2007
151views more  JCST 2007»
13 years 8 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng