Sciweavers

3009 search results - page 571 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
PERCOM
2006
ACM
15 years 11 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
INFOCOM
2007
IEEE
15 years 6 months ago
Resilient Network Coding in the Presence of Byzantine Adversaries
Abstract— Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a mali...
Sidharth Jaggi, Michael Langberg, Sachin Katti, Tr...
INFOCOM
2008
IEEE
15 years 6 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni
WS
2004
ACM
15 years 5 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
HYBRID
2003
Springer
15 years 5 months ago
Estimation of Distributed Hybrid Systems Using Particle Filtering Methods
Abstract. Networked embedded systems are composed of a large number of components that interact with the physical world via a set of sensors and actuators, have their own computati...
Xenofon D. Koutsoukos, James Kurien, Feng Zhao