Sciweavers

503 search results - page 43 / 101
» A survey on bio-inspired networking
Sort
View
CHI
2011
ACM
12 years 11 months ago
Social capital on facebook: differentiating uses and users
Though social network site use is often treated as a monolithic activity, in which all time is equally “social” and its impact the same for all users, we examine how Facebook ...
Moira Burke, Robert Kraut, Cameron Marlow
IJICST
2011
118views more  IJICST 2011»
12 years 11 months ago
Identification, Transparency, Interactivity: Towards a New Paradigm for Credibility for Single-Voice Blogs
This article explores traditional conceptualizations of credibility relying on quantitative and qualitative analyses of data collected by the Institute for the Future of the Book,...
Brian Carroll, R. Randolph Richardson
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 5 months ago
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANE...
Busola S. Olagbegi, Natarajan Meghanathan
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 9 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
MADNES
2005
Springer
14 years 1 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis