Sciweavers

333 search results - page 34 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
ESAS
2005
Springer
14 years 2 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 8 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
WCNC
2008
IEEE
14 years 3 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
APNOMS
2007
Springer
14 years 2 months ago
A Routing Scheme for Supporting Network Mobility of Sensor Network Based on 6LoWPAN
Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to...
Jin Ho Kim, Choong Seon Hong, Koji Okamura