Sciweavers

4264 search results - page 18 / 853
» Provenance-aware secure networks
Sort
View
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
MONET
1998
77views more  MONET 1998»
14 years 9 months ago
Security Protocol for IEEE 802.11 Wireless Local Area Network
Se Hyun Park, Aura Ganz, Zvi Ganz
WICOMM
2002
57views more  WICOMM 2002»
14 years 9 months ago
Adaptive security for multilevel ad hoc networks
Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui G...