Sciweavers

945 search results - page 101 / 189
» Resilient and survivable networks
Sort
View
COMSWARE
2007
IEEE
15 years 3 months ago
An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxybased...
Abhishek Gupta, Pavan Nuggehalli, Joy Kuri
COMCOM
2008
126views more  COMCOM 2008»
15 years 5 hour ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
NORDSEC
2009
Springer
15 years 4 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
GI
2004
Springer
15 years 5 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
TOSN
2010
121views more  TOSN 2010»
14 years 10 months ago
Force-directed approaches to sensor localization
We consider the centralized, anchor-free sensor localization problem. We consider the case where the sensor network reports range information and the case where in addition to the...
Alon Efrat, David Forrester, Anand Iyer, Stephen G...