Sciweavers

4264 search results - page 28 / 853
» Provenance-aware secure networks
Sort
View
129
Voted
ISPEC
2009
Springer
15 years 11 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
93
Voted
CCS
2007
ACM
15 years 10 months ago
Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Me...
CRITIS
2006
15 years 8 months ago
Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
190
Voted
ENTCS
2008
390views more  ENTCS 2008»
15 years 3 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel