Sciweavers

10044 search results - page 117 / 2009
» Authentication in Wireless Networks
Sort
View
GLOBECOM
2009
IEEE
15 years 3 months ago
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks
Many existing pairwise key establishment in sensor networks were developed based on the polynomial-based method. However, this method cannot offer the basic authentication function...
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Ch...
CONEXT
2008
ACM
15 years 1 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
DCOSS
2006
Springer
15 years 3 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
NETWORK
2008
159views more  NETWORK 2008»
14 years 11 months ago
Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks
Hai Liu, Miodrag Bolic, Amiya Nayak, Ivan Stojmeno...
NETWORK
2008
97views more  NETWORK 2008»
14 years 11 months ago
Routing in Large-Scale Wireless Mesh Networks Using Temperature Fields
Rainer Baumann, Simon Heimlicher, Bernhard Plattne...