Sciweavers

1482 search results - page 111 / 297
» Wireless LAN Security
Sort
View
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 11 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
APNOMS
2007
Springer
15 years 9 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
ICASSP
2010
IEEE
15 years 5 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
TMC
2010
138views more  TMC 2010»
15 years 3 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
GLOBECOM
2008
IEEE
15 years 11 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...