Zobrazeno 71 - 80
of 94
pro vyhledávání: '"Conti, M."'
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this pap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9c3ccbaaa170418811389c1ea1418951
https://hdl.handle.net/11590/137121
https://hdl.handle.net/11590/137121
Autor:
Morena Conti, Giuliana Cazzetta, Scionti L, E. Peretti, Emanuele Bosi, Cristiana Vermigli, Gabriella Galimberti, Roberto Pola
Aim The aim of this study was to investigate the effects of frequency modulated electromagnetic neural stimulation (FREMS), a recently developed safe and effective treatment of painful diabetic neuropathy, on cutaneous microvascular function. Methods
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::49d1a7c9d5d34ce9256c46b9dcc29d05
http://hdl.handle.net/11391/113306
http://hdl.handle.net/11391/113306
Publikováno v:
Scopus-Elsevier
Lecture Notes in Electrical Engineering ISBN: 9789400706378
WISES
Lecture Notes in Electrical Engineering ISBN: 9789400706378
WISES
A very compact and high performance datalogger for automotive in-vehicle testing is here described. The small logger dimensions and the availability of a CAN interface allows to easily implement multiple and distributed acquisition schemes, very chal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2214202059c57bd0454b36662f910057
http://hdl.handle.net/10447/45834
http://hdl.handle.net/10447/45834
In-network data aggregation is favorable for wireless sensor networks (WSNs): It allows in-network data processing while reducing the network traffic and hence saving the sensors energy. However, due to the distributed and unattended nature of WSNs,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb4dd69239f4d325560974ad76a6bb9b
http://hdl.handle.net/11577/2476418
http://hdl.handle.net/11577/2476418
Publikováno v:
IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.
In the next future radio frequency identiflcation (RFID) systems will be so pervasive that everyone will wear (maybe unawares) a kit of personal tags. However, a major concern that prevents a wide diffusion of this emerging technology is privacy. Sev
Autor:
Pietro Alessi, Agostino Bellavia, Marco Biffarella, Giorgio Borelli, Giuseppe Bosco, Agostino Buono, Roberto Caico, Lorenzo Cassar, Giuseppe Ciulla, Marco Conti, Calogero De Gregorio, Demis Di Rosa, Giuseppe Ferrigno, Giuseppe Francaviglia, Mario Giurlanda, Giuseppina La Fiura, Francesco Lo Piccolo, Martino Maggio, Giuseppe Davide Mannone, Fabio Pisciotta, Paolo Ponente, Giovanni Reina, Salvatore Sorce, Antonino Tamburello, Alessandro Genco
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f797eaa629668565f58b839776c5fc6
https://doi.org/10.2495/978-1-84564-060-6/07
https://doi.org/10.2495/978-1-84564-060-6/07
Publikováno v:
MobiHoc
Wireless sensor networks are often deployed in hostile environments, where anadversary can physically capture some of the nodes. Once a node is captured, the attackercan re-program it and replicate the node in a large number of clones, thus easily ta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8a4f4caa0e5ddd239518ce53b00c387
http://hdl.handle.net/11577/179944
http://hdl.handle.net/11577/179944
Publikováno v:
PerCom Workshops
This paper presents a new RFID identification protocol: RIPP-FS. The proposed protocol is based on hash chains and it enforces privacy and forward secrecy. Further, unlike other protocols based on hash chains, our proposal is resilient to a specific
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1f92359e3eeb2f72e7c30cee3c8f4ea8
http://hdl.handle.net/11573/884677
http://hdl.handle.net/11573/884677
Autor:
Luís Ribeiro, João Vieira, Luís Nunes, José Paulo Monteiro, Maria da Conceição Cunha, Helena Lucas
Publikováno v:
WIT Transactions on Ecology and the Environment, Vol 99.
Until very recently, public water supply in the Algarve region was almost entirely supported by groundwater wells. However, in the last years of the XX Century, the Portuguese central administration defined a scheme for the public water supply sector
Publikováno v:
PerCom Workshops
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 327-331
STARTPAGE=327;ENDPAGE=331;TITLE=Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops
Conti, M, Di Pietro, R & Mancini, L V 2006, Secure Cooperative Channel Establishment in Wireless Sensor Networks. in Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops . IEEE, New York, pp. 327-331, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 13/03/06 .
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 327-331
STARTPAGE=327;ENDPAGE=331;TITLE=Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops
Conti, M, Di Pietro, R & Mancini, L V 2006, Secure Cooperative Channel Establishment in Wireless Sensor Networks. in Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops . IEEE, New York, pp. 327-331, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 13/03/06 .
This paper presents the ECCE protocol, a new distributed, probabilistic, cooperative protocol to establish a secure pair-wise communication channel between any pair of sensors in a wireless sensor network (WSN). The main contribution of the ECCE prot