Sciweavers

636 search results - page 88 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
ADHOCNOW
2006
Springer
15 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
ICCSA
2005
Springer
15 years 3 months ago
Policy Based Handoff in MIPv6 Networks
As the requirements on high-availability for multimedia intensified new applications increase the pressure for the higher bandwidth on wireless networks, just upgrading to the high...
Jong-Hyouk Lee, Byungchul Park, Hyunseung Choo, Ta...
WIMOB
2008
IEEE
15 years 4 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
GLOBECOM
2009
IEEE
15 years 4 months ago
Cross Layer Multirate Adaptation Using Physical Capture
Abstract—In this paper, to improve the performance of multihop wireless networks, we explore a cross layer multirate adaptation scheme (we call it CROMA) that uses the phenomenon...
Jun Cheol Park, Sneha Kumar Kasera, Neal Patwari
HOTOS
2003
IEEE
15 years 3 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh