Sciweavers

2099 search results - page 320 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
136
Voted
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
PERCOM
2004
ACM
16 years 3 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
150
Voted
ICOIN
2007
Springer
15 years 10 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ITCC
2005
IEEE
15 years 9 months ago
A Mobile Commerce Framework Based on Web Services Architecture
“Mobile Internet” arguably means more than just a new technique for communication; many analysts believe that it will revolutionize the business world and innovate the way ind...
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
WICON
2008
15 years 5 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...