Sciweavers

824 search results - page 6 / 165
» Deployment of Public-Key Infrastructure in Wireless Data Net...
Sort
View
ESAS
2007
Springer
15 years 3 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
APNOMS
2009
Springer
15 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
WWW
2004
ACM
15 years 10 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
INTERNET
2008
193views more  INTERNET 2008»
14 years 9 months ago
Deploying Rural Community Wireless Mesh Networks
The lack of adequate Internet provision in rural areas is widening the digital divide between town and country. This is proving detrimental to social communication as well as the a...
Johnathan Ishmael, Sara Bury, Dimitrios P. Pezaros...
PERCOM
2007
ACM
15 years 9 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...