Sciweavers

712 search results - page 98 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICCSA
2004
Springer
14 years 1 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
MSWIM
2005
ACM
14 years 1 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
SIGCOMM
2006
ACM
14 years 1 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
DFMA
2005
IEEE
143views Multimedia» more  DFMA 2005»
14 years 1 months ago
Efficient Media Asset Transfer in a Unified Framework Managing Broadcasting Systems
File transfer acts an increasing role in digital TV studios and especially for their interconnections. Using adequate file formats to exchange data presents several advantages: lo...
Mathrin Body, Bernard Cousin
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li