Sciweavers

346 search results - page 21 / 70
» An Efficient Scheme for User Authentication in Wireless Sens...
Sort
View
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
PEWASUN
2005
ACM
14 years 2 months ago
Efficient deafness avoidance in wireless ad hoc and sensor networks with directional antennas
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
Yihu Li, Ahmed M. Safwat
IPCCC
2005
IEEE
14 years 2 months ago
SECK: survivable and efficient clustered keying for wireless sensor networks
A wireless sensor network (WSN) typically consists of a large number of small sensor nodes and one or more highend control and data aggregation nodes. Sensor nodes have limited co...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
TMM
2010
410views Management» more  TMM 2010»
13 years 3 months ago
On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks
Abstract--Selective encryption for video streaming was proposed for efficient multimedia content protection. However, the issues on joint optimization of video quality, content pro...
Wei Wang, Michael Hempel, Dongming Peng, Honggang ...
EWSN
2007
Springer
14 years 8 months ago
Efficient Routing from Multiple Sources to Multiple Sinks in Wireless Sensor Networks
Initial deployments of wireless sensor networks (WSNs) were based on a many-to-one communication paradigm, where a single sink collects data from a number of data sources. Recently...
Pietro Ciciriello, Luca Mottola, Gian Pietro Picco