Sciweavers

675 search results - page 8 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
NOTERE
2010
13 years 5 months ago
Managing group membership in ad hoc m-commerce trading systems
Abstract—Managing group membership in an ad hoc mcommerce trading forum is a challenging task as peers may only have partial knowledge of the current membership due to frequent n...
Husna Osman, Hamish Taylor
ICCSA
2009
Springer
14 years 2 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
TON
2008
75views more  TON 2008»
13 years 7 months ago
An algorithmic approach to geographic routing in ad hoc and sensor networks
The one type of routing in ad hoc and sensor networks that currently appears to be most amenable to algorithmic analysis
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 7 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe