Sciweavers

4264 search results - page 17 / 853
» Provenance-aware secure networks
Sort
View
COMCOM
1998
81views more  COMCOM 1998»
14 years 9 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
GLOBECOM
2010
IEEE
14 years 7 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
78
Voted
JCIT
2010
131views more  JCIT 2010»
14 years 4 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
IJNSEC
2010
120views more  IJNSEC 2010»
14 years 4 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
INFOCOM
2010
IEEE
14 years 7 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu