Search For:

Displaying 1-8 out of 8 total
Protecting Voice over IP Communication Using Electronic Identity Cards
Found in: Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, International Conference on
By Rainer Falk, Steffen Fries, Hans Joachim Hof
Issue Date:August 2010
pp. 5-10
Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities ...
 
Industrial Sensor Network Security Architecture
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Rainer Falk, Hans-Joachim Hof
Issue Date:July 2010
pp. 97-102
Wireless sensor-actuator networks have a big usage potential in numerous industrial use cases. They allow easy and flexible deployment of nodes for monitoring and controlling various industrial applications as for example the supervision of critical infras...
 
Simulating a Multi-domain RFID System for Replacement Part Tracking
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li
Issue Date:June 2009
pp. 197-202
The efficient and reliable handling of replacement parts is of high importance for airlines. It can be supported by attaching an RFID tag to replacement parts that stores data identifying unambiguously the replacement part and further information about its...
 
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Rainer Falk, Hans-Joachim Hof
Issue Date:June 2009
pp. 191-196
Sleep deprivation attacks are still an unsolved but critical problem in sensor networks. They aim on quickly exhausting energy reserves of battery-powered sensor nodes by continuously sending messages to the node, preventing the attacked node to switch to ...
 
Profiling the Protection of Sensitive Enterprise Multimedia Communication
Found in: Internet and Web Applications and Services, International Conference on
By Rainer Falk, Steffen Fries
Issue Date:May 2009
pp. 239-246
Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental...
 
Protecting Reconfiguration in Future Mobile Communication Systems
Found in: Database and Expert Systems Applications, International Workshop on
By Rainer Falk, François Haettel, Radha Atukula, Ulf Lücking
Issue Date:August 2005
pp. 267-271
Reconfiguration will only be accepted and hence become a success in the market if the security requirements of all stakeholders are satisfied adequately. Secure reconfiguration involves device protection, secure software download to defend against potentia...
 
Managing Network Security - A Pragmatic Approach
Found in: Reliable Distributed Systems, IEEE Symposium on
By Rainer Falk, Markus Trommer
Issue Date:October 1998
pp. 398
An efficient management is needed to make use of different security mechanisms in large networks. All mechanisms have to be configured consistently according to the security policy. To reduce complexity, the administrator should not have to cope with detai...
 
Public key based authentication for secure integration of sensor data and RFID
Found in: Proceeding of the 1st ACM international workshop on Heterogeneous sensor and actor networks (HeterSanet '08)
By Andreas Koepf, Casey Fung, Florian Kohlmayer, Krishna Sampigethaya, Mingyan Li, Radha Poovendran, Rainer Falk, Richard Robinson
Issue Date:May 2008
pp. 83-92
The incorporation of sensor readings into RFID tags creates a significant potential for applications which require environment monitoring as well as asset management and tracking, such as blood storage and management, and on-board aircraft part maintenance...
     
 1