Sciweavers

1251 search results - page 205 / 251
» On the security of group communication schemes
Sort
View
99
Voted
INFOCOM
2008
IEEE
15 years 8 months ago
Reliability Gain of Network Coding in Lossy Wireless Networks
The capacity gain of network coding has been extensively studied in wired and wireless networks. Recently, it has been shown that network coding improves network reliability by re...
Majid Ghaderi, Donald F. Towsley, James F. Kurose
ICNP
1998
IEEE
15 years 6 months ago
On-Demand Multicast in Mobile Wireless Networks
In this paper we propose an "on demand" multicast routing protocol for a wireless, mobile, multihop network. The proposed scheme has two key features: (a) it is based on...
Ching-Chuan Chiang, Mario Gerla
126
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 8 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
INFOCOM
2007
IEEE
15 years 8 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim