Sciweavers

2116 search results - page 310 / 424
» Resource Analysis by Sup-interpretation
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
SECON
2008
IEEE
14 years 3 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 3 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 3 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to “side-channel attacks...
D. Canright, Lejla Batina
ADHOCNOW
2008
Springer
14 years 3 months ago
Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services
In this paper we address the problem of efficient power allocation in the uplink of CDMA wireless networks, emphasizing on the support of realtime services’ QoS prerequisites. Th...
Timotheos Kastrinogiannis, Eirini-Eleni Tsiropoulo...