Sciweavers

279 search results - page 14 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
IPSN
2010
Springer
13 years 10 months ago
Adaptive IEEE 802.15.4 protocol for energy efficient, reliable and timely communications
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMi...
Pan Gun Park, Carlo Fischione, Karl Henrik Johanss...
CCS
2001
ACM
14 years 17 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
PRIMA
2004
Springer
14 years 1 months ago
Introducing Participative Personal Assistant Teams in Negotiation Support Systems
This paper introduces teams of personal agents that support users individually in electronic negotiations. These agents listen to the running negotiation and to each other to point...
Eric Platon, Shinichi Honiden
MUE
2007
IEEE
97views Multimedia» more  MUE 2007»
14 years 2 months ago
Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network
This paper proposes an autonomous decentralized synchronization system for Inter-Vehicle Communication Network (IVCN). We have to consider the future of IVCN: “time variant” a...
Young An Kim, Choong Seon Hong
JCM
2008
121views more  JCM 2008»
13 years 8 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang