Sciweavers

554 search results - page 51 / 111
» Verifying Security Protocols Modelled by Networks of Automat...
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 8 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
GLOBECOM
2008
IEEE
14 years 2 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
INFOCOM
2007
IEEE
14 years 2 months ago
Analysis of A Loss-Resilient Proactive Data Transmission Protocol in Wireless Sensor Networks
Abstract— Many of sensor network applications require reliable data communication such that data packets can be delivered to the destination without loss. However, existing relia...
Yingqi Xu, Wang-Chien Lee, Jianliang Xu
ICNP
2006
IEEE
14 years 1 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
CCS
2008
ACM
13 years 9 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...