Sciweavers

1357 search results - page 267 / 272
» Security in Wireless Sensor Networks: Issues and Challenges
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
DSN
2004
IEEE
14 years 9 days ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
IPPS
2005
IEEE
14 years 2 months ago
A Cross-Layer Approach for Power-Performance Optimization in Distributed Mobile Systems
The next generation of mobile systems with multimedia processing capabilities and wireless connectivity will be increasingly deployed in highly dynamic and distributed environment...
Shivajit Mohapatra, Radu Cornea, Hyunok Oh, Kyoung...
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 8 months ago
Packaging of RF Mems Switching Functions on Alumina Substrate
The expending development of wireless communication requires strong demands for components with improved capabilities. RF MEMS devices offer a variable alternative to conventional...
M.-K. El Khatib, Arnaud Pothier, Pierre Blondy