Sciweavers

2099 search results - page 142 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CACM
2010
242views more  CACM 2010»
13 years 7 months ago
Wireless insecurity: examining user security behavior on public networks
Tim Chenoweth, Robert P. Minch, Sharon Tabor
JNCA
2011
97views more  JNCA 2011»
13 years 4 months ago
Security analysis of wireless mesh backhauls for mobile networks
Frank A. Zdarsky, Sebastian Robitzsch, Albert Banc...
CRITIS
2006
14 years 1 months ago
Trust Establishment in Ad Hoc and Sensor Networks
Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintain...
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabo...
COMCOM
2008
126views more  COMCOM 2008»
13 years 9 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
ACSAC
2004
IEEE
14 years 1 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh