Sciweavers

858 search results - page 34 / 172
» User Authentication in Sensor Networks
Sort
View
ICDCSW
2007
IEEE
14 years 2 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
WISEC
2009
ACM
14 years 3 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ICAI
2010
13 years 6 months ago
A Sensor Network System for Event Attribution in Multi-user Home Environment
- This paper presents a sensor network system for detecting multiple user activity in a home environment. Recognizing Activities of Daily living (ADLs) by deploying sensors in the ...
Md. Kamrul Hasan, Manhyung Han, Sungyoung Lee, You...
ICOIN
2007
Springer
14 years 2 months ago
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
 Mobile IP (MIP) has been paid a lot of attention as a good candidate  to provide such global mobility among heterogeneous networks.  And, IPv6  incorporat...
Jun-Won Lee, Sang-Won Min, Byung K. Choi
AAAI
2004
13 years 10 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...