Sciweavers

4263 search results - page 156 / 853
» Network Security
Sort
View
167
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
148
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Physical layer security from inter-session interference in large wireless networks
—Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the f...
Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pis...
105
Voted
FTDCS
2003
IEEE
15 years 9 months ago
Secure Middleware for Situation-Aware Naval C2 and Combat Systems
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
Ramesh Bharadwaj
129
Voted
ICPPW
2005
IEEE
15 years 9 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
129
Voted
JCS
2007
84views more  JCS 2007»
15 years 3 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu