Sciweavers

731 search results - page 68 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ISJGP
2010
13 years 6 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
PEWASUN
2004
ACM
14 years 2 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
GLOBECOM
2007
IEEE
14 years 3 months ago
Directional MAC for 60 GHz Using Polarization Diversity Extension (DMAC-PDX)
— This paper proposes a directional medium access control (DMAC) algorithm for wireless communication networks operating in the 60 GHz bands. Wireless communications using the 60...
Ferhat Yildirim, Huaping Liu
SAC
2009
ACM
14 years 3 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
MOBISYS
2007
ACM
14 years 8 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang