Sciweavers

10044 search results - page 101 / 2009
» Authentication in Wireless Networks
Sort
View
ICNP
2005
IEEE
15 years 4 months ago
Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network Experiment
Recent experiments have taken steps towards realizing the vision of extremely large wireless sensor networks, the largest of these being ExScal, in which we
Sandip Bapat, Vinodkrishnan Kulathumani, Anish Aro...
SCN
2008
Springer
166views Communications» more  SCN 2008»
14 years 11 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
IJNSEC
2006
78views more  IJNSEC 2006»
14 years 11 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu