Sciweavers

328 search results - page 4 / 66
» Data Security and wireless networks: mutually exclusive
Sort
View
IJSN
2007
120views more  IJSN 2007»
13 years 5 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
TWC
2008
140views more  TWC 2008»
13 years 5 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
EWSN
2007
Springer
14 years 5 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
APNOMS
2007
Springer
14 years 5 days ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
WCNC
2010
IEEE
13 years 10 months ago
Hierarchical Alphabet and Parametric Channel Constrained Capacity Regions for HDF Strategy in Parametric Wireless 2-WRC
Abstract—The paper addresses wireless the 2-Way Relay Channel (2-WRC) system with a Hierarchical Decode and Forward strategy. This strategy uses a Hierarchical eXclusive Code (HX...
Jan Sykora, Alister G. Burr