Sciweavers

743 search results - page 139 / 149
» Security for fixed sensor networks
Sort
View
ANCS
2008
ACM
13 years 9 months ago
Low power architecture for high speed packet classification
Today's routers need to perform packet classification at wire speed in order to provide critical services such as traffic billing, priority routing and blocking unwanted Inte...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
RAID
2005
Springer
14 years 1 months ago
Anomalous Payload-Based Worm Detection and Signature Generation
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates tha...
Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo
TMC
2011
119views more  TMC 2011»
13 years 2 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
NETWORK
2008
139views more  NETWORK 2008»
13 years 7 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao