Sciweavers

326 search results - page 50 / 66
» Group Rekeying Schemes for Secure Group Communication in Wir...
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
PEWASUN
2005
ACM
14 years 1 months ago
Impact of mobility prediction on the temporal stability of MANET clustering algorithms
Scalability issues for routing in mobile ad hoc networks (MANETs) have been typically addressed using hybrid routing schemes operating in a hierarchical network architecture. Seve...
Aravindhan Venkateswaran, Venkatesh Sarangan, Nata...
SASN
2006
ACM
14 years 1 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
INFOCOM
2006
IEEE
14 years 2 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
SIGOPSE
2004
ACM
14 years 1 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...