153
click to vote
ESAS
15 years 3 months ago
2007 Springer
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
109
click to vote
ESAS
15 years 6 months ago
2007 Springer
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
127
click to vote
ESAS
15 years 6 months ago
2007 Springer
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
116
click to vote
ESAS
15 years 6 months ago
2007 Springer
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
112
click to vote
ESAS
15 years 6 months ago
2007 Springer
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
|