Sciweavers

1677 search results - page 292 / 336
» A distributed security scheme for ad hoc networks
Sort
View
VTC
2010
IEEE
148views Communications» more  VTC 2010»
14 years 8 months ago
Delay-Tolerant Cooperative Diversity Routing MANET
—Some mobile ad hoc networks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup over...
Tian Peng Ren, Yong Liang Guan, Chau Yuen, Rong Ju...
ICN
2009
Springer
14 years 7 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 10 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
MOBIHOC
2007
ACM
15 years 9 months ago
Complexity in geometric SINR
In this paper we study the problem of scheduling wireless links in the geometric SINR model, which explicitly uses the fact that nodes are distributed in the Euclidean plane. We p...
Olga Goussevskaia, Yvonne Anne Oswald, Roger Watte...
ICDCS
2008
IEEE
15 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...