Sciweavers

179 search results - page 26 / 36
» Storage-Optimal Key Sharing with Authentication in Sensor Ne...
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
13 years 7 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
CCS
2010
ACM
13 years 5 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
NDSS
2003
IEEE
14 years 1 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
BROADNETS
2006
IEEE
14 years 1 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
ESAS
2006
Springer
13 years 9 months ago
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networ...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...