Sciweavers

102 search results - page 11 / 21
» Secure Signaling in Next Generation Networks with NSIS
Sort
View
CHI
2007
ACM
13 years 11 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
IPSN
2005
Springer
14 years 27 days ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
GLOBECOM
2008
IEEE
14 years 1 months ago
On Base Station Cooperation Schemes for Downlink Network MIMO under a Constrained Backhaul
— Next generation mobile comunications systems will most likely employ multi-cell cooperative signal processing schemes, often referred to as network MIMO, as these are known to ...
Patrick Marsch, Gerhard Fettweis
ACISICIS
2008
IEEE
14 years 1 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
WISEC
2010
ACM
14 years 6 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt