Sciweavers

606 search results - page 43 / 122
» Towards Survivable and Secure Wireless Sensor Networks
Sort
View
ADHOC
2008
69views more  ADHOC 2008»
13 years 8 months ago
Secure probabilistic location verification in randomly deployed wireless sensor networks
Eylem Ekici, Serdar Vural, Janise McNair, Dawood A...
COMCOM
2007
72views more  COMCOM 2007»
13 years 8 months ago
Trust-based security for wireless ad hoc and sensor networks
Azzedine Boukerche, Li Xu, Khalil El-Khatib
PERCOM
2004
ACM
14 years 8 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 3 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß