Search Results - "2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing"
-
1
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…In this paper, we investigate the feasibility of real time derivation of cryptographic keys in body area networks using unique characteristics of the…”
Get full text
Conference Proceeding -
2
Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic…”
Get full text
Conference Proceeding -
3
Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Recently, Wireless Sensor and Actor Networks have been receiving a growing attention from the research community because of their suitability for critical…”
Get full text
Conference Proceeding -
4
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we…”
Get full text
Conference Proceeding -
5
Above the Trust and Security in Cloud Computing: A Notion Towards Innovation
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges…”
Get full text
Conference Proceeding -
6
An Application Framework for Loosely Coupled Networked Cyber-Physical Systems
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Networked Cyber-Physical Systems (NCPSs) present many challenges since they require a tight combination with the physical world as well as a balance between…”
Get full text
Conference Proceeding -
7
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for…”
Get full text
Conference Proceeding -
8
IOT Gateway: BridgingWireless Sensor Networks into Internet of Things
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely…”
Get full text
Conference Proceeding -
9
Isolating System Faults on Vehicular Network Gateways Using Virtualization
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…The traditional vehicular network gateway takes charge of communication between different internal networks and helping the electric control units in vehicle…”
Get full text
Conference Proceeding -
10
Defending Malicious Collision Attacks in Wireless Sensor Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use…”
Get full text
Conference Proceeding -
11
Real-time Enhancement for Xen Hypervisor
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…System virtualization, which provides good isolation, is now widely used in server consolidation. Meanwhile, one of the hot topics in this field is to extend…”
Get full text
Conference Proceeding -
12
Localization with a Mobile Beacon in Underwater Sensor Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined…”
Get full text
Conference Proceeding -
13
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental…”
Get full text
Conference Proceeding -
14
Security of the TCG Privacy-CA Solution
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…The privacy-CA solution (PCAS) is a protocol designed by the Trusted Computing Group (TCG) as an alternative to the Direct Anonymous Attestation scheme for…”
Get full text
Conference Proceeding -
15
Formal Trust Specification in Service Workflows
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as…”
Get full text
Conference Proceeding -
16
A Cloud Architecture of Virtual Trusted Platform Modules
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM…”
Get full text
Conference Proceeding -
17
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been…”
Get full text
Conference Proceeding -
18
Message from the EUC 2010 Program Chairs
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Presents the welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
19
Keynotes
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made…”
Get full text
Conference Proceeding -
20
Message from the EUC 2010 General Chairs
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Presents the welcome message from the conference proceedings…”
Get full text
Conference Proceeding