Sciweavers

858 search results - page 31 / 172
» User Authentication in Sensor Networks
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
13 years 3 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
TRIDENTCOM
2010
IEEE
13 years 6 months ago
Towards a Virtualized Sensing Environment
Abstract. While deploying a sensor network is necessary for proofof-concept experimentation, it is a time-consuming and tedious task that dramatically slows innovation. Treating se...
David Irwin, Navin Sharma, Prashant J. Shenoy, Mic...
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 8 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
PUC
2002
86views more  PUC 2002»
13 years 8 months ago
Smart CAPs for Smart Its - Context Detection for Mobile Users
Context detection for mobile users plays a major role for enabling novel, human-centric interfaces. For this, we introduce a context detection scheme for disseminated, computer em...
Florian Michahelles, Michael Samulowitz
IPSN
2005
Springer
14 years 2 months ago
Experiences and directions in pushpin computing
— Over the last three years we have built and experimented with the Pushpin Computing wireless sensor network platform. The Pushpin platform is a tabletop multihop wireless senso...
Joshua Lifton, Michael Broxton, Joseph A. Paradiso