Sciweavers

1259 search results - page 28 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
MOBIHOC
2006
ACM
16 years 1 months ago
MISTRAL: : efficient flooding in mobile ad-hoc networks
Stefan Pleisch, Mahesh Balakrishnan, Ken Birman, R...
129
Voted
APNOMS
2007
Springer
15 years 8 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
ESAS
2007
Springer
15 years 5 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
JDCTA
2010
125views more  JDCTA 2010»
14 years 8 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 9 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...