Sciweavers

712 search results - page 91 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICPPW
2005
IEEE
15 years 3 months ago
On Channel Adaptive Energy Management in Wireless Sensor Networks
Energy constraints in a wireless sensor network are crucial issues criticallyaffectingthe network lifetime and connectivity. To realize true energysavingin a wireless environment,t...
Xiao-Hui Lin, Yu-Kwong Kwok
SIGCOMM
1997
ACM
15 years 1 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
ICDCS
2000
IEEE
15 years 2 months ago
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mecha...
Jonathan Robert Stanton, Yair Amir, Damian Hasse, ...
ICALP
2003
Springer
15 years 3 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
GLOBECOM
2007
IEEE
15 years 4 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng