Sciweavers

2024 search results - page 308 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
WISEC
2010
ACM
15 years 9 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
DATE
2007
IEEE
104views Hardware» more  DATE 2007»
15 years 11 months ago
Dynamic reconfiguration in sensor networks with regenerative energy sources
In highly power constrained sensor networks, harvesting energy from the environment makes prolonged or even perpetual execution feasible. In such energy harvesting systems, energy...
Ani Nahapetian, Paolo Lombardo, Andrea Acquaviva, ...
CSE
2011
IEEE
14 years 4 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
CCR
2007
135views more  CCR 2007»
15 years 4 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
COST
1994
Springer
127views Multimedia» more  COST 1994»
15 years 8 months ago
Support for High-Performance Multipoint Multimedia Services
Existing and upcoming distributed multimedia applications require highly diverse services to satisfy their communication needs. Service integrated communication systems should be c...
Georg Carle, Jochen H. Schiller, Claudia Schmidt