Sciweavers

5511 search results - page 172 / 1103
» Security for Network Places
Sort
View
143
Voted
ITNG
2007
IEEE
15 years 10 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
CSREASAM
2003
15 years 5 months ago
Assessing Power Substation Network Security and Survivability: A Work in Progress Report
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Carol Taylor, Paul W. Oman, Axel W. Krings
PERCOM
2007
ACM
16 years 3 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
CCS
2006
ACM
15 years 7 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
ICDCS
2008
IEEE
15 years 10 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou