Sciweavers

412 search results - page 47 / 83
» Random Key Predistribution Schemes for Sensor Networks
Sort
View
86
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 11 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
ITNG
2007
IEEE
15 years 5 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
99
Voted
CN
2006
117views more  CN 2006»
14 years 11 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
GLOBECOM
2008
IEEE
15 years 5 months ago
A Dynamic Load-Balanced Hashing Scheme for Networking Applications
Abstract—Network applications often require large data storage resources, fast queries, and frequent updates. Hash tables support these operations with low costs, yet they cannot...
N. Sertac Artan, Haowei Yuan, H. Jonathan Chao
JCM
2010
98views more  JCM 2010»
14 years 9 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...