Sciweavers

16 search results - page 1 / 4
» ijsn 2008
Sort
View
IJSN
2007
69views more  IJSN 2007»
13 years 5 months ago
Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Va...
IJSN
2008
108views more  IJSN 2008»
13 years 5 months ago
A novel Conference Key Management solution for Secure Dynamic Conferencing
: Conference Key Management (CKM) is one of the primary issues in Secure Dynamic Conferencing (SDC). In this paper, we propose a novel CKM scheme for SDC based on the
Xukai Zou, Yogesh Karandikar
IJSN
2008
92views more  IJSN 2008»
13 years 5 months ago
Visualisation of wormholes in underwater sensor networks: a distributed approach
: We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dim...
Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mar...
IJSN
2007
120views more  IJSN 2007»
13 years 5 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...