Sciweavers

10044 search results - page 123 / 2009
» Authentication in Wireless Networks
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Information Dissemination in Power-Constrained Wireless Networks
— Dissemination of common information through broadcasting is an integral part of wireless network operations such as query of interested events, resource discovery and code upda...
Rong Zheng
JDCTA
2010
186views more  JDCTA 2010»
14 years 10 months ago
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms
The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challe...
Mojtaba Romoozi, Hossein Ebrahimpour-Komleh
AINA
2007
IEEE
15 years 10 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
CORR
2007
Springer
123views Education» more  CORR 2007»
15 years 3 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...