Sciweavers

369 search results - page 38 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
128
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 21 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
132
Voted
WISEC
2010
ACM
15 years 1 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
SENSYS
2003
ACM
15 years 8 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
115
Voted
KIVS
2005
Springer
15 years 9 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
129
Voted
WOWMOM
1999
ACM
124views Multimedia» more  WOWMOM 1999»
15 years 7 months ago
Multimedia Web Services for Mobile Clients Using Quality Aware Transcoding
Mobile applications will increasingly depend upon multimedia information originating in the web and attempt to access this data over wireless networks that are more expensive and ...
Surendar Chandra, Carla Schlatter Ellis, Amin Vahd...