Sciweavers

5891 search results - page 56 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IJSN
2007
120views more  IJSN 2007»
15 years 1 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
ESCIENCE
2006
IEEE
15 years 5 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues