Sciweavers

143
Voted
TISSEC
2008
235views more  TISSEC 2008»
15 years 3 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
86
Voted
TISSEC
2008
84views more  TISSEC 2008»
15 years 3 months ago
Attack-Resistant Location Estimation in Wireless Sensor Networks
Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenli...
91
Voted
TISSEC
2008
84views more  TISSEC 2008»
15 years 3 months ago
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
Svetlana Radosavac, George V. Moustakides, John S....
92
Voted
TISSEC
2008
68views more  TISSEC 2008»
15 years 3 months ago
Secure Time Synchronization in Sensor Networks
Saurabh Ganeriwal, Christina Pöpper, Srdjan C...
139
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 3 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
147
Voted
TISSEC
2008
100views more  TISSEC 2008»
15 years 3 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
71
Voted
TISSEC
2008
77views more  TISSEC 2008»
15 years 3 months ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
77
Voted
TISSEC
2008
64views more  TISSEC 2008»
15 years 3 months ago
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
Felix Brandt, Tuomas Sandholm
78
Voted
TISSEC
2008
45views more  TISSEC 2008»
15 years 3 months ago
Passive-Logging Attacks Against Anonymous Communications Systems
Matthew K. Wright, Micah Adler, Brian Neil Levine,...
71
Voted
TISSEC
2008
56views more  TISSEC 2008»
15 years 3 months ago
The Traust Authorization Service
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...