Sciweavers

234 search results - page 27 / 47
» Text Search Protocols with Simulation Based Security
Sort
View
95
Voted
CCS
2007
ACM
15 years 3 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
91
Voted
TWC
2008
156views more  TWC 2008»
14 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
81
Voted
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
15 years 2 months ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...
COMCOM
2006
100views more  COMCOM 2006»
14 years 9 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi
100
Voted
JCM
2008
73views more  JCM 2008»
14 years 9 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou