Sciweavers

447 search results - page 49 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
COMSWARE
2007
IEEE
14 years 3 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
WCNC
2008
IEEE
14 years 3 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
ICN
2001
Springer
14 years 1 months ago
Secure Communication: A New Application for Active Networks
SplitPath is a new application for the easy, well-known and provably secure one-time pad encryption scheme. Two problems hinder the one-time pad scheme from being applied in the ar...
Manuel Günter, Marc Brogle, Torsten Braun
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
CODASPY
2012
12 years 4 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...