Sciweavers

5234 search results - page 189 / 1047
» Simulation of Computer Network Attacks
Sort
View
ESORICS
2011
Springer
14 years 2 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
PEWASUN
2007
ACM
15 years 3 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
97
Voted
ICCS
2004
Springer
15 years 7 months ago
Dynamic-Data-Driven Real-Time Computational Mechanics Environment
Abstract. The proliferation of sensor networks in various areas of technology has enabled real-time behavioral monitoring of various physical systems in various length and time sca...
John Michopoulos, Charbel Farhat, Elias N. Houstis
FIDJI
2003
Springer
15 years 7 months ago
A Java-Based Uniform Workbench for Simulating and Executing Distributed Mobile Applications
Spontaneous multihop networks with high device mobility and frequent fluctuations are interesting platforms for future distributed applications. Because of the large number of mob...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...
148
Voted
PERCOM
2007
ACM
16 years 2 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...