Sciweavers

1597 search results - page 94 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
GLOBECOM
2010
IEEE
13 years 8 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
INFOCOM
2003
IEEE
14 years 3 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
DATE
2008
IEEE
79views Hardware» more  DATE 2008»
14 years 5 months ago
System Performance Optimization Methodology for Infineon's 32-Bit Automotive Microcontroller Architecture
Microcontrollers are the core part of automotive Electronic Control Units (ECUs). A significant investment of the ECU manufacturers and even their customers is linked to the speci...
Albrecht Mayer, Frank Hellwig
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
14 years 4 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang
JSW
2007
116views more  JSW 2007»
13 years 10 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...