Sciweavers

488 search results - page 7 / 98
» Communication Pattern Based Node Selection for Shared Networ...
Sort
View
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
ICCCN
2007
IEEE
13 years 11 months ago
Scalable Peer-to-Peer File Sharing with Efficient Complex Query Support
A good P2P file sharing system is usually expected to achieve the following design goals: scalability, routing efficiency and complex query support. In this paper, we propose such ...
Yan Li, Jyoti Ahuja, Li Lao, Jun-Hong Cui
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 1 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 2 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 7 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang