Sciweavers

1286 search results - page 82 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
ICCSA
2007
Springer
15 years 9 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
MOBISYS
2006
ACM
16 years 2 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
IPPS
2008
IEEE
15 years 9 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
ICDCS
2005
IEEE
15 years 8 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
NSDI
2004
15 years 4 months ago
Contract-Based Load Management in Federated Distributed Systems
This paper focuses on load management in looselycoupled federated distributed systems. We present a distributed mechanism for moving load between autonomous participants using bil...
Magdalena Balazinska, Hari Balakrishnan, Michael S...