Sciweavers

1677 search results - page 301 / 336
» A distributed security scheme for ad hoc networks
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
INFOCOM
2007
IEEE
14 years 2 months ago
Mobility Reduces Uncertainty in MANETs
Abstract— Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right...
Feng Li, Jie Wu
CN
2006
78views more  CN 2006»
13 years 7 months ago
CNPGSDP: An efficient group-based service discovery protocol for MANETs
The ability to discover services is the major prerequisite for effective usability of MANETs. Group-based Service Discovery (GSD) protocol is a typical service discovery protocol ...
Zhen-guo Gao, Ling Wang, Mei Yang, Xiaozong Yang
CCS
2007
ACM
14 years 1 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
GLOBECOM
2008
IEEE
14 years 2 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar