Sciweavers

5511 search results - page 122 / 1103
» Security for Network Places
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 5 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
PEWASUN
2004
ACM
14 years 4 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CSE
2009
IEEE
14 years 2 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
KES
2007
Springer
14 years 4 months ago
Conceptual Enrichment of Locations Pointed Out by the User
Abstract. The growing availability of GPS and localization technologies in general opens up new challenges regarding the use of position information for Location Based Services. As...
Ana O. Alves, Raquel Hervás, Francisco C. P...
PERCOM
2005
ACM
14 years 10 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...