Sciweavers

1853 search results - page 107 / 371
» Cryptographic Protocols and Network Security
Sort
View
WISEC
2009
ACM
15 years 11 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
CSFW
2009
IEEE
15 years 11 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
MSN
2007
Springer
161views Sensor Networks» more  MSN 2007»
15 years 10 months ago
SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process ...
Chakib Bekara, Maryline Laurent-Maknavicius, Kheir...
IFIP
2010
Springer
14 years 11 months ago
A Calculus for the Analysis of Wireless Network Security Protocols
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled ...
Francesco Ballardin, Massimo Merro
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
15 years 10 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...