Sciweavers

500 search results - page 85 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
IPSN
2005
Springer
14 years 1 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
GLOBECOM
2008
IEEE
14 years 2 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
WAC
2004
Springer
149views Communications» more  WAC 2004»
14 years 1 months ago
BIONETS: BIO-inspired NExt generaTion networkS
The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol conceived almost forty years ago, were never planned ...
Iacopo Carreras, Imrich Chlamtac, Hagen Woesner, C...
EUROCRYPT
2008
Springer
13 years 9 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
SIGMETRICS
2004
ACM
105views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
A model of BGP routing for network engineering
The performance of IP networks depends on a wide variety of dynamic conditions. Traffic shifts, equipment failures, planned maintenance, and topology changes in other parts of th...
Nick Feamster, Jared Winick, Jennifer Rexford