Search Results - "2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing"

Refine Results
  1. 1

    Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks by Ali, S T, Sivaraman, V, Ostry, D

    “…In this paper, we investigate the feasibility of real time derivation of cryptographic keys in body area networks using unique characteristics of the…”
    Get full text
    Conference Proceeding
  2. 2

    Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies by Bhatti, K, Belleudy, C, Auguin, M

    “…This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic…”
    Get full text
    Conference Proceeding
  3. 3

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks by Imran, M, Younis, M, Said, A M, Hasbullah, H

    “…Recently, Wireless Sensor and Actor Networks have been receiving a growing attention from the research community because of their suitability for critical…”
    Get full text
    Conference Proceeding
  4. 4

    A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks by Junqi Zhang, Shankaran, R, Orgun, M A, Varadharajan, V, Sattar, A

    “…In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we…”
    Get full text
    Conference Proceeding
  5. 5

    Above the Trust and Security in Cloud Computing: A Notion Towards Innovation by Ahmed, M, Yang Xiang, Ali, S

    “…While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges…”
    Get full text
    Conference Proceeding
  6. 6

    An Application Framework for Loosely Coupled Networked Cyber-Physical Systems by Minyoung Kim, Stehr, Mark-Oliver, Jinwoo Kim, Soonhoi Ha

    “…Networked Cyber-Physical Systems (NCPSs) present many challenges since they require a tight combination with the physical world as well as a balance between…”
    Get full text
    Conference Proceeding
  7. 7

    Trust-Based Authentication for Secure Communication in Cognitive Radio Networks by Parvin, S, Song Han, Biming Tian, Hussain, F K

    “…Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for…”
    Get full text
    Conference Proceeding
  8. 8

    IOT Gateway: BridgingWireless Sensor Networks into Internet of Things by Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin

    “…With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely…”
    Get full text
    Conference Proceeding
  9. 9

    Isolating System Faults on Vehicular Network Gateways Using Virtualization by Sung-Moon Chung, Hyun-Wook Jin

    “…The traditional vehicular network gateway takes charge of communication between different internal networks and helping the electric control units in vehicle…”
    Get full text
    Conference Proceeding
  10. 10

    Defending Malicious Collision Attacks in Wireless Sensor Networks by Reindl, P, Nygard, K, Xiaojiang Du

    “…Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use…”
    Get full text
    Conference Proceeding
  11. 11

    Real-time Enhancement for Xen Hypervisor by Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan

    “…System virtualization, which provides good isolation, is now widely used in server consolidation. Meanwhile, one of the hot topics in this field is to extend…”
    Get full text
    Conference Proceeding
  12. 12

    Localization with a Mobile Beacon in Underwater Sensor Networks by Lee, Sangho, Kim, Kiseon

    “…In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined…”
    Get full text
    Conference Proceeding
  13. 13

    A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks by Biming Tian, Song Han, Parvin, S, Dillon, T S

    “…The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental…”
    Get full text
    Conference Proceeding
  14. 14

    Security of the TCG Privacy-CA Solution by Liqun Chen, Warinschi, B

    “…The privacy-CA solution (PCAS) is a protocol designed by the Trusted Computing Group (TCG) as an alternative to the Direct Anonymous Attestation scheme for…”
    Get full text
    Conference Proceeding
  15. 15

    Formal Trust Specification in Service Workflows by Viriyasitavat, W, Martin, A

    “…The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as…”
    Get full text
    Conference Proceeding
  16. 16

    A Cloud Architecture of Virtual Trusted Platform Modules by Dongxi Liu, Lee, J, Jang, J, Nepal, S, Zic, J

    “…We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM…”
    Get full text
    Conference Proceeding
  17. 17

    A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card by Bayat, M, Sabzinejad, M, Movahed, A

    “…Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been…”
    Get full text
    Conference Proceeding
  18. 18

    Message from the EUC 2010 Program Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  19. 19

    Keynotes

    “…Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made…”
    Get full text
    Conference Proceeding
  20. 20

    Message from the EUC 2010 General Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding