Sciweavers

179 search results - page 31 / 36
» Storage-Optimal Key Sharing with Authentication in Sensor Ne...
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
ESAS
2006
Springer
15 years 6 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
SENSYS
2006
ACM
15 years 9 months ago
Supporting concurrent applications in wireless sensor networks
It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efï¬...
Yang Yu, Loren J. Rittle, Vartika Bhandari, Jason ...
ATAL
2004
Springer
15 years 8 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CSCW
2011
ACM
14 years 10 months ago
From ethnographic study to mixed reality: a remote collaborative troubleshooting system
In this paper we describe how we moved from ethnographic study to design and testing of a Mixed Reality (MR) system, supporting collaborative troubleshooting of office copiers and...
Jacki O'Neill, Stefania Castellani, Fréd&ea...