Sciweavers

7741 search results - page 72 / 1549
» Security in Active Networks
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 4 months ago
Security Enhancements in Novel Passive Optical Networks
— Passive Optical Networks (PONs) solve the bandwidth bottleneck issue as they extend optical networks to homes and businesses. Security concerns in time division multiplexed PON...
Alan Harris, Andres Sierra, Stamatios V. Kartalopo...
CORR
2007
Springer
123views Education» more  CORR 2007»
13 years 10 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...
DAC
2008
ACM
13 years 12 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
AGENTS
1998
Springer
14 years 2 months ago
Integrating Active Perception with an Autonomous Robot Architecture
Today's robotics applications require complex, real-time, high-bandwidth sensor systems. Although many such systems have been developed [12][14][17][10], integrating them int...
Glenn S. Wasson, David Kortenkamp, Eric Huber