Sciweavers

2601 search results - page 463 / 521
» Secure Rewarding Schemes
Sort
View
OSDI
1994
ACM
15 years 1 months ago
Metadata Update Performance in File Systems
Structural changes, such as file creation and block allocation, have consistently been identified as file system performance problems in many user environments. We compare several...
Gregory R. Ganger, Yale N. Patt
IOR
2008
148views more  IOR 2008»
14 years 12 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
TDSC
2008
121views more  TDSC 2008»
14 years 11 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
TMC
2008
90views more  TMC 2008»
14 years 11 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...