Sciweavers

4264 search results - page 28 / 853
» Provenance-aware secure networks
Sort
View
79
Voted
ISPEC
2009
Springer
15 years 4 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
CCS
2007
ACM
15 years 3 months ago
Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Me...
CRITIS
2006
15 years 1 months ago
Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel