Sciweavers

5511 search results - page 91 / 1103
» Security for Network Places
Sort
View
138
Voted
WS
2005
ACM
15 years 9 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
113
Voted
IWCMC
2009
ACM
15 years 10 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
106
Voted
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
15 years 10 months ago
Building Inter-organizational Cooperative Network for IT Collaboration
Information technology has been a central enabler in the process toward network society. Despite the critical role of computers in inter-organizational arrangements, coordination ...
Lauri Salmivalli, Hannu Salmela, Timo Kestilä
IWAN
2000
Springer
15 years 7 months ago
Differentiated Quality of Service in Application Layer Active Networks
A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algori...
Chris M. Roadknight, Ian W. Marshall
CSREASAM
2009
15 years 1 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong