Sciweavers

94 search results - page 13 / 19
» Models, Protocols, and Architectures for Secure Pervasive Co...
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
ICN
2009
Springer
14 years 8 days ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
WMASH
2003
ACM
14 years 27 days ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
MOBISYS
2008
ACM
14 years 7 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...