Sciweavers

1807 search results - page 252 / 362
» Resilient Overlay Networks
Sort
View
IPCCC
2005
IEEE
15 years 3 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
CIKM
2008
Springer
14 years 12 months ago
Multi-scale characterization of social network dynamics in the blogosphere
We have developed a computational framework to characterize social network dynamics in the blogosphere at individual, group and community levels. Such characterization could be us...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
JPDC
2006
129views more  JPDC 2006»
14 years 10 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
TWC
2008
156views more  TWC 2008»
14 years 10 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
WINET
2010
199views more  WINET 2010»
14 years 8 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar