Sciweavers

267 search results - page 51 / 54
» A framework for distributed key management schemes in hetero...
Sort
View
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
MATA
2000
Springer
137views Communications» more  MATA 2000»
14 years 3 days ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
ADHOCNETS
2009
Springer
13 years 11 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 8 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
PERCOM
2004
ACM
14 years 8 months ago
MediaBroker: An Architecture for Pervasive Computing
We present MediaBroker, a distributed framework designed to support pervasive computing applications. Specifically, we propose an architecture consisting of a transport engine and...
Martin Modahl, Ilya Bagrak, Matthew Wolenetz, Phil...