Sciweavers

2601 search results - page 352 / 521
» Secure Rewarding Schemes
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
CCR
2000
101views more  CCR 2000»
15 years 4 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
IPPS
2006
IEEE
15 years 10 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
CCS
2010
ACM
15 years 11 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger