Sciweavers

10044 search results - page 101 / 2009
» Authentication in Wireless Networks
Sort
View
141
Voted
ICNP
2005
IEEE
15 years 9 months ago
Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network Experiment
Recent experiments have taken steps towards realizing the vision of extremely large wireless sensor networks, the largest of these being ExScal, in which we
Sandip Bapat, Vinodkrishnan Kulathumani, Anish Aro...
134
Voted
SCN
2008
Springer
166views Communications» more  SCN 2008»
15 years 3 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
105
Voted
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 3 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
121
Voted
ALGOSENSORS
2007
Springer
15 years 10 months ago
Counting-Sort and Routing in a Single Hop Radio Network
Maciej Gebala, Marcin Kik