Sciweavers

2024 search results - page 78 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
TIP
2010
170views more  TIP 2010»
14 years 11 months ago
A Distributed Topological Camera Network Representation for Tracking Applications
Abstract--Sensor networks have been widely used for surveillance, monitoring, and tracking. Camera networks, in particular, provide a large amount of information that has tradition...
Edgar J. Lobaton, Ramanarayan Vasudevan, Ruzena Ba...
JCSS
2006
102views more  JCSS 2006»
15 years 4 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
GLOBECOM
2008
IEEE
15 years 4 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 4 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
AINA
2007
IEEE
15 years 11 months ago
Wireless Sensor Network Applications in Urban Telehealth
Advances in wireless sensor network management have potential applications in urban telehealth. Telehealth is the delivery of health related services and information via telecommu...
Patricia Morreale