Sciweavers

1513 search results - page 68 / 303
» Fibonacci Correction Networks
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 11 months ago
Performance Evaluation of Wireless Sensor Networks Using Turbo Codes with Multi-Route Transmission
— Wireless sensor networks (WSNs) usually have a regular lattice structure and can be considered as multi-hop multi-route networks. In multi-route transmissions, even if the link...
Tadahiro Wada, Kouji Ohuchi, Abbas Jamalipour, Hir...
ICDCSW
2007
IEEE
15 years 11 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 10 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
143
Voted
FPGA
2006
ACM
156views FPGA» more  FPGA 2006»
15 years 8 months ago
A reconfigurable architecture for network intrusion detection using principal component analysis
In this paper, we develop an architecture for principal component analysis (PCA) to be used as an outlier detection method for high-speed network intrusion detection systems (NIDS...
David T. Nguyen, Gokhan Memik, Alok N. Choudhary
CSFW
2000
IEEE
15 years 8 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider