Sciweavers

158 search results - page 30 / 32
» Ad Hoc Key Management Infrastructure
Sort
View
WICOMM
2010
143views more  WICOMM 2010»
14 years 8 months ago
Routing for cognitive radio networks consisting of opportunistic links
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs m...
Kwang-Cheng Chen, Bilge Kartal Cetin, Yu-Cheng Pen...
ACSAC
2000
IEEE
15 years 2 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
HPCC
2007
Springer
15 years 3 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
86
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 9 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ADHOC
2007
104views more  ADHOC 2007»
14 years 9 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong