Sensor network key establishment mechanism depending on depending information

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of fingerprint quality measures depending on sensor technology

Julian Fierrez, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez‡ (Dated: November 15, 2007) Abstract Although many image quality measures have been proposed for fingerprints, few works have taken into account how differences among capture devices impact on the image quality. In this paper, several representative measures for assessing the quality of fingerprint images are compared using an opt...

متن کامل

Depending on Session-Typed Processes

This work proposes a dependent type theory that combines functions and session-typed processes (with value dependencies) through a contextual monad, internalising typed processes in a dependently-typed lambda-calculus. The proposed framework, by allowing session processes to depend on functions and vice-versa, enables us to specify and statically verify protocols where the choice of the next co...

متن کامل

An Application-Oriented Framework for Wireless Sensor Network Key Establishment

The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on key establishment in wireless sensor networks, much of which does not pay heed to the variety of different application requirements. We set out a simple framework for classifying wireless sensor networks in terms of t...

متن کامل

Key Establishment Using Group Information for Wireless Sensor Networks

Wireless sensor networks are commonly used for critical security tasks such as intrusion or tamper detection, and therefore must be protected. To date, security of these networks relies mostly on key establishment and routing protocols. We present a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables sen...

متن کامل

Business process visualization depending on user needs

In this paper, I describe our approach to simplified process visualization based on user’s role in the process. During our work on reference process model for universities in the Czech Republic, we have identified two different user groups of business processes diagrams. While the management of a university and process analysts need to see the whole process, tasks of every participant and commu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2006

ISSN: 1598-2858

DOI: 10.3745/kipstc.2006.13c.2.195