Sciweavers

1597 search results - page 42 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CCS
2006
ACM
15 years 7 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
WISTP
2010
Springer
15 years 10 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
146
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
130
Voted
CISS
2008
IEEE
15 years 9 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
138
Voted
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 9 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...