Sciweavers

6122 search results - page 90 / 1225
» Securing network access in wireless sensor networks
Sort
View
SECURWARE
2008
IEEE
14 years 3 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
14 years 2 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
PERCOM
2007
ACM
14 years 8 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
IJSN
2008
145views more  IJSN 2008»
13 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
WISEC
2010
ACM
14 years 4 months ago
On the efficiency of secure beaconing in VANETs
Elmar Schoch, Frank Kargl