Sciweavers

566 search results - page 41 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
JCM
2008
69views more  JCM 2008»
13 years 7 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
IEICET
2007
60views more  IEICET 2007»
13 years 7 months ago
A Generic Localized Broadcast Framework in Mobile Ad Hoc Ubiquitous Sensor Networks
Hui Xu, Brian J. d'Auriol, Jinsung Cho, Sungyoung ...
SIGOPS
2002
49views more  SIGOPS 2002»
13 years 7 months ago
On the need for system-level support for ad hoc and sensor networks
Rimon Barr, John C. Bicket, Daniel S. Dantas, Bowe...
INFOCOM
2012
IEEE
11 years 10 months ago
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks
Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdon...
DSN
2005
IEEE
14 years 1 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...