Sciweavers

1597 search results - page 36 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
SECRYPT
2010
147views Business» more  SECRYPT 2010»
13 years 5 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
ACSW
2006
13 years 9 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
CCS
2008
ACM
13 years 9 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
MOBICOM
2006
ACM
14 years 1 months ago
Localization in underwater sensor networks: survey and challenges
In underwater sensor networks (UWSNs), determining the location of every sensor is important and the process of estimating the location of each node in a sensor network is known a...
Vijay R. Chandrasekhar, Winston Khoon Guan Seah, Y...