Sciweavers

449 search results - page 82 / 90
» A Platform for Implementing Secure Wireless Ad Hoc Networks
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
ACSC
2004
IEEE
13 years 11 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
AINA
2006
IEEE
14 years 1 months ago
Application Programming Interface for Configuration of Multi-Robot Sensor Networks
In this paper we propose a design of Application Programming Interfaces (APIs) for configuration of Multi-Robot Sensor Networks (MRSNs). Such networks have unique aspects: intenti...
Junya Yamashita, Ryohei Suzuki, Kei Sawai, Hiroki ...
CONEXT
2006
ACM
14 years 1 months ago
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Wafa Berrayana, Habib Youssef, Stéphane Loh...