Sciweavers

832 search results - page 124 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
JSAC
2006
167views more  JSAC 2006»
14 years 11 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 3 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
COMCOM
2007
82views more  COMCOM 2007»
14 years 11 months ago
Jumping ant routing algorithm for sensor networks
Enterprises that may rely on critical equipments which are constantly moving around, for example, hospitals – need to ensure they can know the current location of vital but mobi...
Wei-Ming Chen, Chung-Sheng Li, Fu-Yu Chiang, Han-C...
SAC
2004
ACM
15 years 4 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...