Sciweavers

1129 search results - page 13 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
DAWAK
2006
Springer
14 years 15 days ago
Providing Persistence for Sensor Data Streams by Remote WAL
Rapidly changing environments such as robots, sensor networks, or medical services are emerging. To deal with them, DBMS should persist sensor data streams instantaneously. To achi...
Hideyuki Kawashima, Michita Imai, Yuichiro Anzai
GLOBECOM
2009
IEEE
14 years 21 days ago
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks
Many existing pairwise key establishment in sensor networks were developed based on the polynomial-based method. However, this method cannot offer the basic authentication function...
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Ch...
MASS
2010
156views Communications» more  MASS 2010»
13 years 6 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 9 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 9 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang