Sciweavers

10044 search results - page 71 / 2009
» Authentication in Wireless Networks
Sort
View
EWSN
2004
Springer
15 years 10 months ago
Power Sources for Wireless Sensor Networks
Shad Roundy, Dan Steingart, Luc Frechette, Paul K....
ICMCS
2005
IEEE
71views Multimedia» more  ICMCS 2005»
15 years 4 months ago
A proposal of butterfly-graph based stream authentication over lossy networks
In this paper, we propose a butterfly-graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 11 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
IANDC
2008
84views more  IANDC 2008»
14 years 9 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe