Sciweavers

271 search results - page 32 / 55
» Context-agile encryption for high speed communication networ...
Sort
View
CCS
2001
ACM
14 years 5 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
EUROPKI
2006
Springer
13 years 11 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
HOLOMAS
2009
Springer
14 years 8 days ago
Mobility Model for Tactical Networks
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...
Milan Rollo, Antonín Komenda
IMC
2007
ACM
13 years 9 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
PADS
2004
ACM
14 years 1 months ago
Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks
In mobile ad hoc network (MANET) studies, it is imperative to use highly detailed device models as they provide high layer protocols with good prediction of underlying wireless co...
Gavin Yeung, Mineo Takai, Rajive Bagrodia, Alireza...