Sciweavers

283 search results - page 4 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
73
Voted
PERCOM
2007
ACM
15 years 9 months ago
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the...
Leonardo B. Oliveira, Ricardo Dahab, Julio L&oacut...
WIOPT
2005
IEEE
15 years 3 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
IJSN
2006
116views more  IJSN 2006»
14 years 10 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
EJWCN
2011
119views more  EJWCN 2011»
14 years 5 months ago
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks
Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, A...
117
Voted
INFOCOM
2012
IEEE
13 years 18 days ago
Optimal surface deployment problem in wireless sensor networks
—Sensor deployment is a fundamental issue in a wireless sensor network, which often dictates the overall network performance. Previous studies on sensor deployment mainly focused...
Miao Jin, Guodong Rong, Hongyi Wu, Liang Shuai, Xi...