Sciweavers

448 search results - page 57 / 90
» Who is in Control
Sort
View
139
Voted
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 10 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
115
Voted
SASO
2008
IEEE
15 years 10 months ago
Self-Organizing Sleep-Wake Sensor Systems
We propose a self-organizing sleep-wake sensor system that is scalable, easily implemented, and energy conserving. An application of concepts from cellular automata theory account...
Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. C...
128
Voted
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
15 years 10 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
133
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
An Optimal Strategy for Cooperative Spectrum Sensing in Cognitive Radio Networks
— Spectrum sensing is a key enabling functionality in cognitive radio (CR) networks, where the CRs act as secondary users that opportunistically access free frequency bands. Due ...
Zhi Quan, Shuguang Cui, Ali H. Sayed
112
Voted
ICNP
2007
IEEE
15 years 10 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic