Sciweavers

738 search results - page 51 / 148
» Security considerations in ad hoc sensor networks
Sort
View
JCM
2008
69views more  JCM 2008»
13 years 8 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
IEICET
2007
60views more  IEICET 2007»
13 years 8 months ago
A Generic Localized Broadcast Framework in Mobile Ad Hoc Ubiquitous Sensor Networks
Hui Xu, Brian J. d'Auriol, Jinsung Cho, Sungyoung ...
SIGOPS
2002
49views more  SIGOPS 2002»
13 years 8 months ago
On the need for system-level support for ad hoc and sensor networks
Rimon Barr, John C. Bicket, Daniel S. Dantas, Bowe...
INFOCOM
2012
IEEE
11 years 11 months ago
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks
Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdon...
AINA
2011
IEEE
13 years 8 days ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor