Sciweavers

858 search results - page 43 / 172
» User Authentication in Sensor Networks
Sort
View
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
14 years 8 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
ESCIENCE
2006
IEEE
14 years 2 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
LCN
2006
IEEE
14 years 2 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
RTCSA
2006
IEEE
14 years 2 months ago
A Software Infrastructure for Wearable Sensor Networks
In ubiquitous computing environments, contextawareness is one of the most important research topics. Computers embedded in our surrounding can extract information about a user, an...
Kensuke Hanaoka, Ayako Takagi, Tatsuo Nakajima