Sciweavers

158 search results - page 24 / 32
» Ad Hoc Key Management Infrastructure
Sort
View
ESAS
2007
Springer
14 years 4 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
DPD
2007
100views more  DPD 2007»
13 years 9 months ago
Managing real-time database transactions in mobile ad-hoc networks
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastr...
Le Gruenwald, Shankar M. Banik, Chuo N. Lau
BTW
2007
Springer
189views Database» more  BTW 2007»
14 years 4 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
ECS
2006
89views more  ECS 2006»
13 years 10 months ago
Dynamic Decision Protocol For Adhoc Network
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Mohamed Ben Othman
SSDBM
2011
IEEE
257views Database» more  SSDBM 2011»
13 years 1 months ago
Database-as-a-Service for Long-Tail Science
Database technology remains underused in science, especially in the long tail  the small labs and individual researchers that collectively produce the majority of scientic output...
Bill Howe, Garrett Cole, Emad Souroush, Paraschos ...