Sciweavers

1259 search results - page 238 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
DIM
2005
ACM
13 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
TPDS
2002
173views more  TPDS 2002»
13 years 8 months ago
Data Gathering Algorithms in Sensor Networks Using Energy Metrics
Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an...
Stephanie Lindsey, Cauligi S. Raghavendra, Krishna...
JCIT
2008
129views more  JCIT 2008»
13 years 9 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan
TCSV
2002
99views more  TCSV 2002»
13 years 8 months ago
Low-delay and error-robust wireless video transmission for video communications
Video communications over wireless networks often suffer from various errors. In this paper, a novel video transmission architecture is proposed to meet the low-delay and error-rob...
Tu-Chih Wang, Hung-Chi Fang, Liang-Gee Chen
MOBICOM
2003
ACM
14 years 2 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...