Sciweavers

1051 search results - page 81 / 211
» Secure Continuity for Sensor Networks
Sort
View
IPCCC
2007
IEEE
15 years 10 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
NDSS
2003
IEEE
15 years 9 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
BSN
2009
IEEE
155views Sensor Networks» more  BSN 2009»
15 years 11 months ago
A Wearable Fabric Computer by Planar-Fashionable Circuit Board Technique
— A method to fabricate circuits on the cloth, planar fashionable circuit board (P-FCB), is proposed. And its applications such as fabric passive elements, user I/O interface, an...
Hyejung Kim, Yongsang Kim, Binhee Kim, Hoi-Jun Yoo
CONEXT
2006
ACM
15 years 10 months ago
SNARE: sensor node attached reputation evaluator
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
Ismat K. Maarouf, A. R. Naseer
SUTC
2006
IEEE
15 years 10 months ago
Self-organization Strategies for Dynamic Context Coverage in Capability-Constrained Mobile Sensor Networks
We propose and formally characterize a new problem named the dynamic context coverage problem in capabilityconstrained mobile sensor network environments. The goal is to move and ...
Shiow-yang Wu, Chao-Hong Liu, Chen-Kuang Tzeng