Sciweavers

1630 search results - page 75 / 326
» Secure Overlay Network Design
Sort
View
ACISP
2000
Springer
15 years 2 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
NOSSDAV
2004
Springer
15 years 3 months ago
Scalable resilient media streaming
We present a low-overhead media streaming system, called SRMS (Scalable Resilient Media Streaming) that can be used to scalably deliver streaming data to a large group of receiver...
Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby B...
EWSN
2009
Springer
15 years 10 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
ESAS
2004
Springer
15 years 3 months ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
TDSC
2011
14 years 4 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...