Sciweavers

15 search results - page 1 / 3
» ijsn 2006
Sort
View
70
Voted
IJSN
2006
56views more  IJSN 2006»
14 years 11 months ago
A self-encryption authentication protocol for teleconference services
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
65
Voted
IJSN
2007
69views more  IJSN 2007»
14 years 10 months ago
Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Va...
IJSN
2006
123views more  IJSN 2006»
14 years 11 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
IJSN
2010
148views more  IJSN 2010»
14 years 9 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
79
Voted
IJSN
2006
95views more  IJSN 2006»
14 years 11 months ago
Building trust in peer-to-peer systems: a review
: The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-...
Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli