Sciweavers

832 search results - page 142 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
TCS
2008
14 years 9 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
ICALP
2004
Springer
15 years 2 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
85
Voted
COMCOM
2007
156views more  COMCOM 2007»
14 years 9 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 2 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
CF
2005
ACM
14 years 11 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland