Sciweavers

15 search results - page 1 / 3
» ijsn 2006
Sort
View
IJSN
2006
56views more  IJSN 2006»
13 years 4 months ago
A self-encryption authentication protocol for teleconference services
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
IJSN
2007
69views more  IJSN 2007»
13 years 4 months ago
Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Va...
IJSN
2006
123views more  IJSN 2006»
13 years 4 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
IJSN
2010
148views more  IJSN 2010»
13 years 2 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
IJSN
2006
95views more  IJSN 2006»
13 years 4 months ago
Building trust in peer-to-peer systems: a review
: The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-...
Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli