Sciweavers

890 search results - page 35 / 178
» On the attractiveness of the star network
Sort
View
EWSN
2008
Springer
15 years 11 months ago
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
Abstract. By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibili...
Piotr Szczechowiak, Leonardo B. Oliveira, Michael ...
AINA
2007
IEEE
15 years 1 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
IMC
2009
ACM
15 years 6 months ago
Understanding online social network usage from a network perspective
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users...
Fabian Schneider, Anja Feldmann, Balachander Krish...
GLOBECOM
2007
IEEE
15 years 6 months ago
Gaussian Approximations for Carrier Sense Modeling in Wireless Ad Hoc Networks
— Physical carrier sense for wireless multihop networks has attracted a certain degree of attention since it is a simple yet important mechanism for distributed channel access. S...
Francesco Rossetto, Michele Zorzi
MADNES
2005
Springer
15 years 5 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis