Sciweavers

325 search results - page 26 / 65
» Secure safe ambients
Sort
View
ICDS
2009
IEEE
14 years 2 months ago
Security and User Guidelines for the Design of the Future Networked Systems
—Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. ...
Seppo Heikkinen, Sari Kinnari, Kari Heikkinen
CCS
2009
ACM
14 years 2 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
KI
2008
Springer
13 years 7 months ago
Monitoring Movement Behavior by Means of a Large Area Proximity Sensor Array in the Floor
This paper describes an innovative sensor system which can detect and track people in a room by means of an array of capacitive sensors beneath the floor covering. By combining cut...
Axel Steinhage, Christl Lauterbach
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
14 years 2 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
ICPADS
2007
IEEE
14 years 1 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies