Sciweavers

583 search results - page 5 / 117
» On Cooperative Wireless Network Secrecy
Sort
View
WCNC
2008
IEEE
15 years 5 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
WINET
2010
199views more  WINET 2010»
14 years 9 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
AINA
2004
IEEE
15 years 2 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
NETWORK
2008
118views more  NETWORK 2008»
14 years 11 months ago
Using Incompletely Cooperative Game Theory in Wireless Mesh Networks
Liqiang Zhao, Jie Zhang, Hailin Zhang
CIS
2007
Springer
15 years 5 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh