Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
4264
search results - page 18 / 853
»
Provenance-aware secure networks
Sort
relevance
views
votes
recent
update
View
thumb
title
127
click to vote
TMC
2010
138
views
more
TMC 2010
»
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
15 years 2 months ago
Download
www2.engr.arizona.edu
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
claim paper
Read More »
64
click to vote
COMPUTER
2002
48
views
more
COMPUTER 2002
»
Wanted: More Network-Security Graduates and Research
15 years 4 months ago
Download
www.cs.virginia.edu
Linda Dailey Paulson
claim paper
Read More »
111
click to vote
COMCOM
1999
63
views
more
COMCOM 1999
»
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
15 years 4 months ago
Download
www.dmst.aueb.gr
Stefanos Gritzalis, Diomidis Spinellis, Panagiotis...
claim paper
Read More »
114
click to vote
MONET
1998
77
views
more
MONET 1998
»
Security Protocol for IEEE 802.11 Wireless Local Area Network
15 years 4 months ago
Download
pages.cs.wisc.edu
Se Hyun Park, Aura Ganz, Zvi Ganz
claim paper
Read More »
90
click to vote
WICOMM
2002
57
views
more
WICOMM 2002
»
Adaptive security for multilevel ad hoc networks
15 years 4 months ago
Download
netlab.cs.ucla.edu
Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui G...
claim paper
Read More »
« Prev
« First
page 18 / 853
Last »
Next »