Sciweavers

4263 search results - page 85 / 853
» Network Security
Sort
View
147
Voted
ESAS
2007
Springer
15 years 8 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
103
Voted
WISEC
2009
ACM
15 years 9 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
NCA
2006
IEEE
15 years 8 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
130
Voted
WS
2006
ACM
15 years 8 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
99
Voted
IADIS
2004
15 years 3 months ago
Hacker Activity on the Irish Honeynet
The Irish HoneyNet Project is an all volunteer, non-profit organisation committed to sharing and learning the motives, tools, and tactics of the blackhat community comprised of a ...
Kevin Curran, Colman Morrissey, Colm Fagan, Colm M...