Sciweavers

75 search results - page 7 / 15
» A Comprehensive Secure VoIP Solution
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
VTC
2007
IEEE
101views Communications» more  VTC 2007»
14 years 2 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
IEEEARES
2007
IEEE
14 years 2 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
INFOCOM
2010
IEEE
13 years 6 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
CN
2008
128views more  CN 2008»
13 years 8 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford