Sciweavers

346 search results - page 32 / 70
» An Efficient Scheme for User Authentication in Wireless Sens...
Sort
View
TCOM
2008
120views more  TCOM 2008»
13 years 9 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
ITIIS
2008
153views more  ITIIS 2008»
13 years 9 months ago
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks
In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduc...
Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
WINET
2011
13 years 4 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu