Sciweavers

1677 search results - page 213 / 336
» A distributed security scheme for ad hoc networks
Sort
View
NETWORKING
2007
14 years 11 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...
CSREASAM
2006
14 years 11 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
CN
1999
91views more  CN 1999»
14 years 9 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...
82
Voted
CCS
2009
ACM
15 years 5 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
68
Voted
LCN
2002
IEEE
15 years 3 months ago
A First Look at Wired Sensor Networks for Video Surveillance Systems
Sensor networks are a major new area of research. Some sensor applications, such as video surveillance, will need to be tethered for reasons of bandwidth and power requirements. T...
Vijay Chandramohan, Kenneth J. Christensen