Sciweavers

1677 search results - page 254 / 336
» A distributed security scheme for ad hoc networks
Sort
View
NETGAMES
2003
ACM
15 years 3 months ago
Experiences using a dual wireless technology infrastructure to support ad-hoc multiplayer games
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...
OTM
2007
Springer
15 years 4 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
WCNC
2008
IEEE
15 years 4 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
SUTC
2010
IEEE
15 years 1 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 2 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith