Sciweavers

858 search results - page 158 / 172
» User Authentication in Sensor Networks
Sort
View
PERVASIVE
2005
Springer
14 years 26 days ago
u-Photo: Interacting with Pervasive Services Using Digital Still Images
This paper presents u-Photo which is an interactive digital still image including information of pervasive services associated with networked appliances and sensors in pervasive co...
Genta Suzuki, Shun Aoki, Takeshi Iwamoto, Daisuke ...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 2 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
SASN
2004
ACM
14 years 24 days ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
RAS
2008
108views more  RAS 2008»
13 years 6 months ago
Towards long-lived robot genes
Robot projects are often evolutionary dead ends, with the software and hardware they produce disappearing without trace afterwards. Common causes include dependencies on uncommon ...
Paul M. Fitzpatrick, Giorgio Metta, Lorenzo Natale
PERCOM
2003
ACM
14 years 7 months ago
Dynamic Application Composition: Customizing the Behavior of an Active Space
The proliferation of wireless networks, hand-held PCs, touch panels, large flat displays, sensors, and embedded devices is transforming traditional habitats and living spaces into...
Brian Ziebart, Manuel Román, Roy H. Campbel...