Sciweavers

2673 search results - page 49 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Know Your Enemy, Know Yourself: Block-Level Network Behavior Profiling and Tracking
Abstract. Gaining a better knowledge of one's own network is crucial to effectively manage and secure today's large, diverse campus and enterprise networks. Because of th...
Esam Sharafuddin, Nan Jiang, Yu Jin, Zhi-Li Zhang
JEC
2006
100views more  JEC 2006»
13 years 7 months ago
RC-SIMD: Reconfigurable communication SIMD architecture for image processing applications
During the last two decades, Single Instruction Multiple Data (SIMD) processors have become important architectures in embedded systems for image processing applications. The main ...
Hamed Fatemi, Bart Mesman, Henk Corporaal, Twan Ba...
ICICS
2010
Springer
13 years 5 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
WISEC
2010
ACM
14 years 19 days ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru