Sciweavers

644 search results - page 16 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ICPADS
2005
IEEE
14 years 10 days ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis
TON
2012
11 years 9 months ago
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
—This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. DAWN leverages declarative networking techniques to achieve extensibl...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
BROADNETS
2005
IEEE
14 years 11 days ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
MOBIHOC
2003
ACM
14 years 6 months ago
SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks
A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes in the network. The performance of proactive ...
Venugopalan Ramasubramanian, Zygmunt J. Haas, Emin...
STOC
2006
ACM
116views Algorithms» more  STOC 2006»
14 years 20 days ago
Information-theoretically secure protocols and security under composition
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies the security of these ...
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin