Sciweavers

158 search results - page 18 / 32
» Ad Hoc Key Management Infrastructure
Sort
View
EUROCRYPT
2004
Springer
14 years 1 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
MWCN
2004
Springer
14 years 3 months ago
Cluster-Based Location-Services for Scalable Ad Hoc Network Routing
: We propose a location-service to assist location-based routing protocols, realised through our Associativity-Based Clustering protocol. The main goal of our scheme, which employs...
Sivapathalingham Sivavakeesar, George Pavlou
POPL
2008
ACM
14 years 10 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 9 months ago
Rethinking Information Theory for Mobile Ad Hoc Networks
The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundam...
Jeffrey G. Andrews, Nihar Jindal, Martin Haenggi, ...
ADHOC
2007
169views more  ADHOC 2007»
13 years 10 months ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone