Sciweavers

117 search results - page 11 / 24
» Security in Mobile Communications: Challenges and Opportunit...
Sort
View
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 1 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 28 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
MOBIHOC
2005
ACM
14 years 7 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
GLOBECOM
2007
IEEE
14 years 2 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...