196
Voted
ESAS
15 years 7 months ago
2007 Springer
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
143
click to vote
ESAS
15 years 10 months ago
2007 Springer
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
161
Voted
ESAS
15 years 10 months ago
2007 Springer
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
157
click to vote
ESAS
15 years 10 months ago
2007 Springer
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
149
click to vote
ESAS
15 years 10 months ago
2007 Springer
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
|