Sciweavers

2081 search results - page 270 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
SASN
2005
ACM
14 years 1 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
PE
2008
Springer
139views Optimization» more  PE 2008»
13 years 8 months ago
Performance optimization of region-based group key management in mobile ad hoc networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang
CDC
2008
IEEE
128views Control Systems» more  CDC 2008»
14 years 2 months ago
Time-robust discrete control over networked Loosely Time-Triggered Architectures
In this paper we consider Loosely Time-Triggered Architectures (LTTA) as a networked infrastructure for deploying discrete control. LTTA are distributed architectures in which 1/ ...
Paul Caspi, Albert Benveniste