Sciweavers

1129 search results - page 61 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
CRISIS
2008
13 years 10 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
ISICT
2003
13 years 10 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
ICDCS
2007
IEEE
14 years 3 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
INFOCOM
2011
IEEE
13 years 20 days ago
Delay-bounded MAC with minimal idle listening for sensor networks
—This paper presents a new receiver-initiated sensor network MAC protocol, called CyMAC, which has the following unique features. It reduces the idle listening time of sensor nod...
Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang
JIT
1999
Springer
81views Database» more  JIT 1999»
14 years 1 months ago
A Jini-based Gateway Architecture for Mobile Devices
In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and ...
Gerd Aschemann, Roger Kehr, Andreas Zeidler