Sciweavers

96 search results - page 14 / 20
» Ad Hoc Security Associations for Groups
Sort
View
ADHOC
2006
155views more  ADHOC 2006»
13 years 7 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
ATAL
2004
Springer
14 years 27 days ago
Groups of Collaborating Users and Agents in Ambient Intelligent Environments
An ad hoc agent environment is a way for users to interact with an ambient intelligent environment. Agents are associated with every device, service or content. Utilizing agents, ...
Jan M. V. Misker, Cor J. Veenman, Léon J. M...
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ATAL
2004
Springer
14 years 27 days ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
MMMACNS
2010
Springer
13 years 5 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...