All Stories

  1. A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
  2. Middleware Application, Suitable to Build an Automated and Connected Smart Manufacturing Environment
  3. Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security
  4. Real-Time Video Latency Measurement between a Robot and Its Remote Control Station: Causes and Mitigation
  5. Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
  6. Federated Hybrid Clouds Service Level Agreements and Legal Issues
  7. High Bandwidth Maritime Communication Systems – Review of Existing Solutions and New Proposals
  8. Hybrid Cloud Computing QoS Glitches
  9. Motion artefact minimization from photoplethysmography based non-invasive hemoglobin sensor based on an envelope filtering algorithm
  10. Bump in the wire (BITW) security solution for a marine ROV remote control application
  11. An efficient implementation of FPGA based high speed IPSec (AH/ESP) core
  12. Bloom filter–based efficient broadcast algorithm for the Internet of things
  13. Cloud computing and Internet of Things fusion: Cost issues
  14. A secure end-to-end IoT solution
  15. Underwater Depth and Temperature Sensing Based on Fiber Optic Technology for Marine and Fresh Water Applications
  16. Cluster head election and rotation for medical-based wireless sensor networks
  17. Reconfiguration of neighbouring nodes in coastal monitoring wireless sensor networks based on leader node recommendation
  18. Inspection-Class Remotely Operated Vehicles—A Review
  19. An Experimental Study of the Effects of External Physiological Parameters on the Photoplethysmography Signals in the Context of Local Blood Pressure (Hydrostatic Pressure Changes)
  20. An Optical Fibre Depth (Pressure) Sensor for Remote Operated Vehicles in Underwater Applications
  21. Bloom filter based data collection algorithm for wireless sensor networks
  22. Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision
  23. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks
  24. Foreword by Guest Editors for the Special Issue on the 2016 Global Conference on Wireless and Optical Communications (GCWOC’16)
  25. An FPGA based reconfigurable IPSec ESP core suitable for IoT applications
  26. Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks
  27. Review and evaluation of WSN simulation tools in a cloud based environment
  28. Efficient and High Speed FPGA Bump in the Wire Implementation for Data Integrity and Confidentiality Services in the IoT
  29. Trust security mechanism for maritime wireless sensor networks
  30. Logboat — A simulation framework enabling CAN security assessments
  31. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
  32. High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs
  33. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing
  34. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT
  35. AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs
  36. Medical WSN: Defense for selective forwarding attack
  37. Trust Security Mechanism for Marine Wireless Sensor Networks
  38. FPGA Based Real Time 'Secure' Body Temperature Monitoring Suitable for WBSN
  39. FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications
  40. An optical fibre sensor for combined point pressure measurement and spatially resolved temperature measurement
  41. Healthcare WSN: Cluster Elections and Selective Forwarding Defense
  42. Medical WSN: Power, routing and selective forwarding defense
  43. Optical fiber pressure sensors based on Extrinsic Fabry Perot Interferometer (EFPI) for the depth control in marine environment
  44. Novel miniature pressure and temperature optical fibre sensor based on an extrinsic Fabry-Perot Interferometer (EFPI) and Fibre Bragg Gratings (FBG) for the Ocean environment
  45. Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA
  46. Underwater pressure measurement using fibre optic extrinsic Fabry-Perot interferometric (EFPI) sensors
  47. Logically Optimized Smallest FPGA Architecture for SHA- 3 Core
  48. A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz
  49. A Mote Interface for Fiber Optic Spectral Sensing With Real-Time Monitoring of the Marine Environment
  50. Coexistence measurements and analysis of IEEE 802.15.4 with Wi-Fi and bluetooth for vehicle networks
  51. Development of a discriminating fibre optic sensing array for wireless real time analysis of the maritime environment
  52. 2.4 GHz IEEE 802.15.4 channel interference classification algorithm running live on a sensor node
  53. Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks
  54. Prototype of a secure wireless patient monitoring system for the medical community
  55. Configuration Tool for a Wireless Sensor Network Integrated Security Framework
  56. MArSSeNs: A modular architecture for the security of sensor networks
  57. Low cost hydrocarbon spillage sensor for the marine environment with interfacing to a mote platform
  58. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC
  59. Technologies and Architectures for Multimedia-Support in Wireless Sensor Network
  60. Optical fibre cavity for ring-down experiments with low coupling losses
  61. Towards integrated security for sensor network applications
  62. Large-core fibre-cavity design for ring-down experiments
  63. A novel and scalable key management scheme for wireless sensor networks
  64. Security for Wireless Sensor Networks – Configuration Aid
  65. On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
  66. Novel passive fibre-cavity design for ring-down experiments using a multimode optical waveguide
  67. Review of platforms and security protocols suitable for wireless sensor networks
  68. Power considerations when using high capacity data storage on wireless sensor motes
  69. Novel multimode fibre-cavity for ring-down experiments
  70. Development of a prototyping platform for the integration of multiple fiber optic sensing devices to a SHIMMER™ system for in-situ maritime monitoring.
  71. A comparative review of wireless sensor network mote technologies
  72. Setting up secure wireless sensor networks
  73. Selection application for platforms and security protocols suitable for wireless sensor networks
  74. A tool for the security configuration of sensor networks
  75. Fibre-optic evanescent-wave field fluid concentration sensor
  76. Security for wireless sensor networks: A review
  77. On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs
  78. Evaluation of key distribution protocols for use with wireless sensor networks
  79. Wireless Sensor Node hardware: A review
  80. Learning, self-scheduling TDMA (LeSS-TDMA) for sensor networks
  81. Investigation of binary liquid aqueous methanol and ethanol mixtures using meander-shaped fibre-optic evanescent-wave absorption sensors
  82. Learning, self-scheduling TDMA (LeSS-TDMA) for wireless sensor networks
  83. Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
  84. The Impact of Java and Public Key Cryptography in Wireless Sensor Networking
  85. TDMA Protocol Requirements for Wireless Sensor Networks
  86. SENSORCOMM 2008 Preface
  87. Securing Wireless Sensor Networks: Security Architectures
  88. On the logical verification of a group key agreement protocol for resource constrained mobile devices
  89. Resources Implications for Data Security in Wireless Sensor Network Nodes
  90. On the Formal Verification of the SNEP Key Agreement Protocol for Wireless Sensor Networks
  91. Key handling in wireless sensor networks
  92. Efficiently securing data on a wireless sensor network
  93. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
  94. Power Management in Operating Systems for Wireless Sensor Nodes
  95. A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks
  96. Realisation of a minimum-knowledge identification and signature scheme