Sciweavers

10044 search results - page 182 / 2009
» Authentication in Wireless Networks
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
Network Coding via Opportunistic Forwarding in Wireless Mesh Networks
— Network coding has been used to increase transportation capabilities in wireless mesh networks. In mesh networks, the coding opportunities depend on the co-location of multiple...
Jian Zhang, Yuanzhu Peter Chen, Ivan Marsic
ACSAC
1997
IEEE
15 years 8 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 9 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
15 years 2 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
MOBIHOC
2005
ACM
16 years 3 months ago
Hybrid sensor networks: a small world
In this paper, we investigate the use of limited infrastructure, in the form of wires, for improving the energy efficiency of a wireless sensor network. We call such a sensor netw...
Gaurav Sharma, Ravi Mazumdar