Sciweavers

1988 search results - page 288 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CHI
2007
ACM
14 years 9 months ago
An extensible platform for the interactive exploration of Fitts' Law and related movement time models
This paper describes a new software platform for the interactive exploration of human performance models such as Fitts' law. The software is written in Java and provides a fl...
Martin J. Schedlbauer
BSN
2009
IEEE
158views Sensor Networks» more  BSN 2009»
14 years 3 months ago
Wearable Sensing for Dynamic Management of Dense Ubiquitous Media
— Most visions of ubiquitous computing anticipate a world permeated by a dense sampling of sensors, many of which will be capable of capturing, analyzing, and transmitting person...
Mathew Laibowitz, Nan-Wei Gong, Joseph A. Paradiso
DCOSS
2010
Springer
14 years 10 days ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 21 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
IJSN
2008
145views more  IJSN 2008»
13 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li