Sciweavers

738 search results - page 51 / 148
» Security considerations in ad hoc sensor networks
Sort
View
JCM
2008
69views more  JCM 2008»
15 years 1 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
IEICET
2007
60views more  IEICET 2007»
15 years 1 months ago
A Generic Localized Broadcast Framework in Mobile Ad Hoc Ubiquitous Sensor Networks
Hui Xu, Brian J. d'Auriol, Jinsung Cho, Sungyoung ...
SIGOPS
2002
49views more  SIGOPS 2002»
15 years 1 months ago
On the need for system-level support for ad hoc and sensor networks
Rimon Barr, John C. Bicket, Daniel S. Dantas, Bowe...
INFOCOM
2012
IEEE
13 years 4 months ago
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks
Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdon...
AINA
2011
IEEE
14 years 5 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor