Sciweavers

IJSN
2007
69views more  IJSN 2007»
13 years 12 months ago
Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Va...
IJSN
2006
116views more  IJSN 2006»
14 years 13 days ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon
IJSN
2006
56views more  IJSN 2006»
14 years 13 days ago
A self-encryption authentication protocol for teleconference services
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
IJSN
2006
95views more  IJSN 2006»
14 years 13 days ago
Building trust in peer-to-peer systems: a review
: The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-...
Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli
IJSN
2006
123views more  IJSN 2006»
14 years 13 days ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
IJSN
2006
140views more  IJSN 2006»
14 years 13 days ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
IJSN
2006
124views more  IJSN 2006»
14 years 13 days ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
IJSN
2006
93views more  IJSN 2006»
14 years 13 days ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra
IJSN
2006
76views more  IJSN 2006»
14 years 13 days ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
IJSN
2006
116views more  IJSN 2006»
14 years 13 days ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...