Sciweavers

529 search results - page 98 / 106
» Cluster based Key Management in Wireless Sensor Networks
Sort
View
CCS
2008
ACM
14 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
67
Voted
KBSE
2007
IEEE
15 years 4 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
ISCI
2008
66views more  ISCI 2008»
14 years 9 months ago
An energy-efficient real-time scheduling scheme on dual-channel networks
The recent evolution of wireless sensor networks have yielded a demand to improve energy-efficient scheduling algorithms and energy-efficient medium access protocols. This paper p...
Mikyung Kang, Dong-In Kang, Jinwoo Suh, Junghoon L...
INFOCOM
2010
IEEE
14 years 8 months ago
Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices—such as wireless microphones (WMs)— is a challenging, but very important, problem that has n...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
INFOCOM
2009
IEEE
15 years 4 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang