Sciweavers

10044 search results - page 150 / 2009
» Authentication in Wireless Networks
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 11 months ago
Comparison of different Broadcast Schemes for Multi-Hop Wireless Sensor Networks
In this paper, we present the performance of different broadcast schemes for multihop sensor networks based on mathematical modeling. In near future many applications will demand ...
S. Mehta, K. S. Kwak
ICWN
2010
14 years 9 months ago
Detecting and Labelling Wireless Community Network Structures from Eigen-spectra
Wireless and ad hoc networks often have local regions of highly intra-connected modules or communities of nodes against a backdrop of sparser longer-range intercommunity connectiv...
Ken A. Hawick
NETWORKING
2007
15 years 1 months ago
Using PANA for Mobile IPv6 Bootstrapping
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...
NETWORK
2008
151views more  NETWORK 2008»
14 years 11 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
GI
2001
Springer
15 years 4 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich