Sciweavers

479 search results - page 3 / 96
» Lightweight Security for Network Coding
Sort
View
SIGSOFT
2007
ACM
14 years 6 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ASM
2010
ASM
14 years 2 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
INFOCOM
2008
IEEE
13 years 11 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
COMCOM
2006
88views more  COMCOM 2006»
13 years 5 months ago
A lightweight secure protocol for wireless sensor networks
Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao
CCS
2006
ACM
13 years 9 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin