Sciweavers

16 search results - page 1 / 4
» ijsn 2008
Sort
View
81
Voted
IJSN
2008
61views more  IJSN 2008»
15 years 16 days ago
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
Feng Li, Avinash Srinivasan, Jie Wu
75
Voted
IJSN
2007
69views more  IJSN 2007»
15 years 1 days ago
Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Va...
95
Voted
IJSN
2008
108views more  IJSN 2008»
15 years 16 days ago
A novel Conference Key Management solution for Secure Dynamic Conferencing
: Conference Key Management (CKM) is one of the primary issues in Secure Dynamic Conferencing (SDC). In this paper, we propose a novel CKM scheme for SDC based on the
Xukai Zou, Yogesh Karandikar
101
Voted
IJSN
2008
92views more  IJSN 2008»
15 years 16 days ago
Visualisation of wormholes in underwater sensor networks: a distributed approach
: We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dim...
Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mar...
112
Voted
IJSN
2007
120views more  IJSN 2007»
15 years 13 days ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...