Sciweavers

230 search results - page 11 / 46
» Secure Comparison of Encrypted Data in Wireless Sensor Netwo...
Sort
View
TMC
2010
138views more  TMC 2010»
13 years 6 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 7 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
ISCIS
2005
Springer
14 years 1 months ago
Comparison of Hyper-DAG Based Task Mapping and Scheduling Heuristics for Wireless Sensor Networks
Abstract. In-network processing emerges as an approach to reduce energy consumption in Wireless Sensor Networks (WSN) by decreasing the overall transferred data volume. Parallel pr...
Yuan Tian, Füsun Özgüner, Eylem Eki...
ICC
2007
IEEE
245views Communications» more  ICC 2007»
14 years 2 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 9 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik