Sciweavers

EUC
2007
Springer
14 years 2 months ago
GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger
Abstract. Location is the most essential presence information for mobile users. In this paper, we present an improved time-based clustering technique for extracting significant lo...
Dexter H. Hu, Cho-Li Wang
EUC
2007
Springer
14 years 2 months ago
U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Interact with the Ubiquitous Environment by Gestures
In this paper we present a system, called U-interactive, that provides spontaneous interactions between human and surrounding objects in heterogenous ubiquitous computing environme...
Gyudong Shim, SangKwon Moon, Yong Song, JaeSub Kim...
EUC
2007
Springer
14 years 4 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
EUC
2007
Springer
14 years 4 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
EUC
2007
Springer
14 years 4 months ago
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing
A Wireless Sensor Network (WSN) composed of tiny sensor nodes may operate in an unfavorable terrain. The coupling of inherent limitations and harsh environments makes WSNs fallible...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
EUC
2007
Springer
14 years 6 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
EUC
2007
Springer
14 years 6 months ago
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
EUC
2007
Springer
14 years 6 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
EUC
2007
Springer
14 years 6 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
EUC
2007
Springer
14 years 6 months ago
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems
Networked embedded systems present unique challenges for system designers composing distributed applications with dyanmic, real-time, and resilience requirements. We consider the ...
Binoy Ravindran, Edward Curley, Jonathan Stephen A...