Sciweavers

5511 search results - page 72 / 1103
» Security for Network Places
Sort
View
COMCOM
2004
83views more  COMCOM 2004»
13 years 10 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
SAINT
2003
IEEE
14 years 3 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 10 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
SPW
2005
Springer
14 years 3 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
APNOMS
2006
Springer
14 years 2 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...