Sciweavers

10044 search results - page 71 / 2009
» Authentication in Wireless Networks
Sort
View
EWSN
2004
Springer
16 years 3 months ago
Power Sources for Wireless Sensor Networks
Shad Roundy, Dan Steingart, Luc Frechette, Paul K....
99
Voted
ICMCS
2005
IEEE
71views Multimedia» more  ICMCS 2005»
15 years 9 months ago
A proposal of butterfly-graph based stream authentication over lossy networks
In this paper, we propose a butterfly-graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong
138
Voted
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 3 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
124
Voted
IANDC
2008
84views more  IANDC 2008»
15 years 2 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe