Sciweavers

412 search results - page 69 / 83
» Random Key Predistribution Schemes for Sensor Networks
Sort
View
89
Voted
AINA
2004
IEEE
15 years 1 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
ICASSP
2011
IEEE
14 years 1 months ago
Convergence results in distributed Kalman filtering
Abstract—The paper studies the convergence properties of the estimation error processes in distributed Kalman filtering for potentially unstable linear dynamical systems. In par...
Soummya Kar, Shuguang Cui, H. Vincent Poor, Jos&ea...
ACSAC
2009
IEEE
15 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
WS
2003
ACM
15 years 2 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
PERVASIVE
2008
Springer
14 years 9 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...