Sciweavers

4189 search results - page 800 / 838
» On the Security of Wireless Sensor Networks
Sort
View
PERCOM
2009
ACM
14 years 5 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
PET
2009
Springer
14 years 4 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
PERCOM
2006
ACM
14 years 9 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
PERCOM
2004
ACM
14 years 9 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
NEW2AN
2007
Springer
14 years 4 months ago
Communications Challenges in the Celtic-BOSS Project
The BOSS project [1] aims at developing an innovative and bandwidth efficient communication system to transmit large data rate communications between public transport vehicles and ...
Gábor Jeney, Catherine Lamy-Bergot, Xavier ...