Sciweavers

111
Voted
TISSEC
2008
235views more  TISSEC 2008»
15 years 19 days ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
55
Voted
TISSEC
2008
84views more  TISSEC 2008»
15 years 19 days ago
Attack-Resistant Location Estimation in Wireless Sensor Networks
Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenli...
TISSEC
2008
84views more  TISSEC 2008»
15 years 19 days ago
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
Svetlana Radosavac, George V. Moustakides, John S....
70
Voted
TISSEC
2008
68views more  TISSEC 2008»
15 years 19 days ago
Secure Time Synchronization in Sensor Networks
Saurabh Ganeriwal, Christina Pöpper, Srdjan C...
111
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 19 days ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
122
Voted
TISSEC
2008
100views more  TISSEC 2008»
15 years 19 days ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
TISSEC
2008
77views more  TISSEC 2008»
15 years 19 days ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
58
Voted
TISSEC
2008
64views more  TISSEC 2008»
15 years 19 days ago
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
Felix Brandt, Tuomas Sandholm
60
Voted
TISSEC
2008
45views more  TISSEC 2008»
15 years 19 days ago
Passive-Logging Attacks Against Anonymous Communications Systems
Matthew K. Wright, Micah Adler, Brian Neil Levine,...
56
Voted
TISSEC
2008
56views more  TISSEC 2008»
15 years 19 days ago
The Traust Authorization Service
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...