Sciweavers

1853 search results - page 229 / 371
» Cryptographic Protocols and Network Security
Sort
View
PERVASIVE
2004
Springer
15 years 10 months ago
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Jun Rekimoto, Takashi Miyaki, Michimune Kohno
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 4 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
137
Voted
IWSEC
2009
Springer
15 years 11 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
JSAC
2006
183views more  JSAC 2006»
15 years 4 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran
153
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang