Sciweavers

2503 search results - page 132 / 501
» Building Computer Network Attacks
Sort
View
DCOSS
2006
Springer
15 years 1 months ago
Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks
When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryptio...
William Conner, Tarek F. Abdelzaher, Klara Nahrste...
ADHOCNOW
2005
Springer
15 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ECIS
2000
14 years 11 months ago
Full Bindingness and Confidentiality
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
Arnd Weber
IPSN
2005
Springer
15 years 3 months ago
Some sensor network elements for ubiquitous computing
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...
HPCN
1997
Springer
15 years 1 months ago
Ninf: A Network Based Information Library for Global World-Wide Computing Infrastructure
Ninf is an ongoing global network-wide computing infrastructure project which allows users to access computational resources including hardware, software and scientific data distri...
Mitsuhisa Sato, Hidemoto Nakada, Satoshi Sekiguchi...