Sciweavers

2099 search results - page 258 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CIDR
2007
185views Algorithms» more  CIDR 2007»
15 years 5 months ago
Rethinking Data Management for Storage-centric Sensor Networks
Data management in wireless sensor networks has been an area of significant research in recent years. Many existing sensor data management systems view sensor data as a continuou...
Yanlei Diao, Deepak Ganesan, Gaurav Mathur, Prasha...
JCP
2008
119views more  JCP 2008»
15 years 4 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
CCS
2009
ACM
15 years 11 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
NCA
2008
IEEE
15 years 10 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
15 years 9 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak