Sciweavers

1166 search results - page 75 / 234
» Adaptively Secure Broadcast
Sort
View
IEEECIT
2010
IEEE
14 years 11 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
121
Voted
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 21 days ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
98
Voted
ISM
2005
IEEE
133views Multimedia» more  ISM 2005»
15 years 6 months ago
Image Based Tracking of News Stories
Broadcasters often reuse video clips while reporting news stories. New clips are added to the story as it develops replacing old clips. A subset of these video clips may be replay...
Jedrzej Z. Miadowicz, John M. Gauch, Abhishek Shiv...
EUSAI
2007
Springer
15 years 6 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
89
Voted
OTM
2007
Springer
15 years 6 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...