Sciweavers

241 search results - page 8 / 49
» Using Conservation of Flow as a Security Mechanism in Networ...
Sort
View
PERVASIVE
2007
Springer
14 years 2 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 5 months ago
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANE...
Busola S. Olagbegi, Natarajan Meghanathan
WINET
2002
101views more  WINET 2002»
13 years 8 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 1 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...