Sciweavers

6122 search results - page 72 / 1225
» Securing network access in wireless sensor networks
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
INFOCOM
1999
IEEE
13 years 12 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
GIL
2009
13 years 5 months ago
Wireless Sensor Network for Cattle Monitoring System
: This paper describes a cost effective Wireless Sensor Network (WSN) technology for monitoring the health of dairy cows. By monitoring and understanding the cow individual and her...
Tsung Ta Wu, Swee Keow Goo, Kae Hsiang Kwong, Crai...
MOBIHOC
2005
ACM
14 years 7 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao