Sciweavers

229 search results - page 12 / 46
» Security Analysis of Two Anonymous Authentication Protocols ...
Sort
View
COMCOM
2011
13 years 2 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
BROADNETS
2006
IEEE
14 years 1 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
WCNC
2008
IEEE
14 years 2 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
ENTCS
2006
173views more  ENTCS 2006»
13 years 7 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
PERCOM
2009
ACM
14 years 2 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner