Sciweavers

1351 search results - page 157 / 271
» Trust in Anonymity Networks
Sort
View
PERCOM
2011
ACM
13 years 1 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
CSCW
2012
ACM
12 years 5 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...
PCI
2005
Springer
14 years 3 months ago
Reliable Transmission Using Intermediate Sink or Source Nodes in Sensor Networks
The main resarch in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most impo...
Bo-Hyung Lee, Hyung-Wook Yoon, Jongho Park, Min Yo...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
CSREASAM
2008
13 years 11 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner