Sciweavers

661 search results - page 121 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
ICDCSW
2003
IEEE
14 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
HOTNETS
2010
13 years 3 months ago
The home needs an operating system (and an app store)
Abstract-- We argue that heterogeneity is hindering technological innovation in the home--homes differ in terms of their devices and how those devices are connected and used. To ab...
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. ...
ICDCSW
2002
IEEE
14 years 1 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
WISEC
2010
ACM
13 years 9 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ICCCN
2007
IEEE
14 years 20 days ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...