Sciweavers

4263 search results - page 48 / 853
» Network Security
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
CCS
2009
ACM
14 years 10 days ago
A chipset level network backdoor: bypassing host-based firewall & IDS
Sherri Sparks, Shawn Embleton, Cliff Changchun Zou
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 6 months ago
Clustered Hierarchy in Sensor Networks: Performance and Security
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from...
Mohammed Abuhelaleh, Khaled M. Elleithy, Thabet M....
IPPS
2007
IEEE
14 years 2 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
KIVS
2007
Springer
14 years 1 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...