Sciweavers

177 search results - page 9 / 36
» An Identity-Based Key Agreement Protocol for the Network Lay...
Sort
View
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 7 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
CSREASAM
2006
13 years 9 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez
ADHOCNOW
2006
Springer
14 years 1 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel
ADHOC
2010
135views more  ADHOC 2010»
13 years 2 months ago
Efficient broadcast for wireless ad hoc networks with a realistic physical layer
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consum...
Hui Xu, J. J. Garcia-Luna-Aceves
IPTPS
2004
Springer
14 years 26 days ago
On Transport Layer Support for Peer-to-Peer Networks
TCP is the transport protocol used predominantly in the Internet as well as in peer-to-peer networks. However, peerto-peer networks exhibit very different characteristics from tho...
Hung-Yun Hsieh, Raghupathy Sivakumar