Sciweavers

2358 search results - page 314 / 472
» A Secure Pervasive Environment
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services a...
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustd...
IEEEARES
2006
IEEE
15 years 10 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
15 years 10 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
SECPERU
2006
IEEE
15 years 10 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
VTC
2006
IEEE
179views Communications» more  VTC 2006»
15 years 10 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu