Sciweavers

369 search results - page 28 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
AINA
2008
IEEE
15 years 8 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
CN
2008
106views more  CN 2008»
15 years 2 months ago
Efficient virtual-backbone routing in mobile ad hoc networks
Since the physical topology of Mobile Ad hoc Networks (MANETs) is generally unstable, an appealing approach is the construction of a stable and robust virtual topology or backbone...
Jamal N. Al-Karaki, Ahmed E. Kamal
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 1 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SEUS
2008
IEEE
15 years 8 months ago
M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks
In this paper we investigate a practical routing solution for a new class of wireless sensor networks where any node can be mobile anytime. Assuming GPS-enabled sensor nodes we pro...
Lynn Choi, Jae Kyun Jung, Byong-Ha Cho, Hyohyun Ch...