In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
Abstract. The dissemination of context data across a pervasive environment has proven to be a difficult problem. Techniques using gossiping algorithms offer simplicity and flexibil...
Syarulnaziah Anawar, Lorcan Coyle, Simon Dobson, P...
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
: One of the keys to success for applications of mobile and/or intelligent agents in large-scale open systems such as Internet is the ability of heterogeneous agents to cooperate a...
—Using directional antennas to conserve bandwidth and energy consumption in ad hoc wireless networks has attracted much attention of the research community in recent years. Howev...