Sciweavers

6122 search results - page 184 / 1225
» Securing network access in wireless sensor networks
Sort
View
148
Voted
SAC
2009
ACM
15 years 11 months ago
Integrating standardized transaction protocols in service-oriented wireless sensor networks
Despite much research in the area of wireless sensor networks in recent years, the programming of sensor nodes is still time-consuming and tedious. A new paradigm which seems to b...
Christoph Reinke, Nils Hoeller, Jana Neumann, Sven...
COMSWARE
2007
IEEE
15 years 11 months ago
Analysis of Dynamic Sensor Networks: Power Law Then What?
— Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these...
Eric Fleury, Jean-Loup Guillaume, Céline Ro...
WWW
2008
ACM
16 years 5 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
162
Voted
AINA
2009
IEEE
15 years 11 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
156
Voted
VTC
2007
IEEE
15 years 11 months ago
Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks
— In this paper we investigate the authentication behaviour of mobile nodes within wireless mesh access networks. This work evaluates the authentication time and the authenticati...
Andreas Roos, S. Wieland, A. Th. Schwarzbacher, Ba...