Sciweavers

324 search results - page 44 / 65
» Chord-Based Key Establishment Schemes for Sensor Networks
Sort
View
130
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
112
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Green modulation in dense Wireless Sensor Networks
Due to unique characteristics of sensor nodes, choosing an energyefficient modulation scheme with low-complexity implementation (refereed to as green modulation) is a critical fa...
Jamshid Abouei, Konstantinos N. Plataniotis, Subba...
140
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
147
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
116
Voted
ADHOC
2007
109views more  ADHOC 2007»
15 years 3 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang