A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
- D. Malan, M. Welsh, Michael D. Smith
- Computer Science, MathematicsFirst Annual IEEE Communications Society…
- 4 October 2004
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.
CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care
- D. Malan, T. Fulford-Jones, M. Welsh, S. Moulton
- Computer Science
- 2004
The architecture of CodeBlue, a wireless infrastructure intended for deployment in emergency medical care, integrating low-power, wireless vital sign sensors, PDAs, and PC-class systems, is introduced and research challenges being addressed are highlighted.
Sensor networks for emergency response: challenges and opportunities
- K. Lorincz, D. Malan, S. Moulton
- Computer ScienceIEEE pervasive computing
- 1 October 2004
The proposed CodeBlue integrates sensor nodes and other wireless devices into a disaster response setting and provides facilities for ad hoc network formation, resource naming and discovery, security, and in-network aggregation of sensor-produced data.
Scratch for budding computer scientists
- D. Malan, Henry H. Leitner
- Computer ScienceTechnical Symposium on Computer Science Education
- 7 March 2007
It is found that, not only did Scratch excite students at a critical time (i.e.,, their first foray into computer science), it also familiarized the inexperienced among th with fundamentals of programming without the distraction of syntax.
Implementing public-key infrastructure for sensor networks
- D. Malan, M. Welsh, Michael D. Smith
- Computer Science, MathematicsTOSN
- 1 August 2008
A critical evaluation of the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote is presented, demonstrating that public keys can be generated within 34 seconds and that shared secrets can be distributed among nodes in a sensor network within the same time.
Podcasting computer science E-1
- D. Malan
- EducationTechnical Symposium on Computer Science Education
- 7 March 2007
It is argued that podcasting offers to extend universities' educational reach more than it offers to improve education itself, and is also claimed to claim is significant, not the technology itself.
Disk Imaging with the Advanced Forensic Format , Library and Tools
- S. Garfinkel, D. Malan, K. Dubec, Christopher C. Stevens, C. Pham
- Computer Science
- 2006
AIMAGE, the advanced imager, a new disk image acquisition program that compares favorably with existing alternatives and is more efficient, because AFF images consume less disk space than EnCase images of the same disk.
Advanced Forensic Format: An Open, Extensible Format for Disk Imaging
- S. Garfinkel, D. Malan, K. Dubec, Christopher C. Stevens, C. Pham
- Geology
- 29 January 2006
The Advanced Forensic Format is described, which is designed as an alternative to current proprietary disk image formats, and it is more flexible because it allows extensive metadata to be stored with images.
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms
- D. Malan, Michael D. Smith
- Computer ScienceWorm
- 3 November 2006
It is found that the collaborative architecture, using patterns of system calls and simple heuristics, can detect worms running on multiple peers and significantly reduces the probability of false positives because of the unlikely appearance on many peers simultaneously of non-worm processes with worm-like properties.
Crypto for Tiny Objects
- D. Malan
- Computer Science, Mathematics
- 2004
This work presents the first known implementation of elliptic curve cryptography for sensor networks, motivated by those networks’ need for an efficient, secure mechanism for shared cryptographic…
...
...