Sciweavers

1630 search results - page 109 / 326
» Secure Overlay Network Design
Sort
View
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
15 years 1 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
MSWIM
2006
ACM
15 years 3 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
ICIP
2008
IEEE
15 years 11 months ago
Peer-to-peer multicast live video streaming with interactive virtual pan/tilt/zoom functionality
Video streaming with virtual pan/tilt/zoom functionality allows the viewer to watch arbitrary regions of a high-spatial-resolution scene. In our proposed system, the user controls...
Aditya Mavlankar, Jeonghun Noh, Pierpaolo Bacciche...
TISSEC
2008
235views more  TISSEC 2008»
14 years 9 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
WS
2004
ACM
15 years 3 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran