Sciweavers

5511 search results - page 145 / 1103
» Security for Network Places
Sort
View
130
Voted
COLCOM
2007
IEEE
15 years 10 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
131
Voted
SECON
2007
IEEE
15 years 10 months ago
Feasibility of In-car Wireless Sensor Networks: A Statistical Evaluation
— Statistical characterization of in-car wireless communication channels has recently gained significance, mainly due to the possibility of deploying a wireless sensor network i...
Hsin-Mu Tsai, Wantanee Viriyasitavat, Ozan K. Tong...
103
Voted
EMNLP
2009
15 years 1 months ago
Geo-mining: Discovery of Road and Transport Networks Using Directional Patterns
One of the most desired information types when planning a trip to some place is the knowledge of transport, roads and geographical connectedness of prominent sites in this place. ...
Dmitry Davidov, Ari Rappoport
134
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
140
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn