Sciweavers

211 search results - page 33 / 43
» Identity-Based Access Control for Ad Hoc Groups
Sort
View
ICDCSW
2007
IEEE
14 years 1 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
ICC
2000
IEEE
151views Communications» more  ICC 2000»
14 years 1 days ago
Channel-Hopping Multiple Access
— The medium-access control (MAC) protocols for wireless networks proposed or implemented to date based on collision-avoidance handshakes between sender and receiver either requi...
Asimakis Tzamaloukas, J. J. Garcia-Luna-Aceves
TPDS
2008
178views more  TPDS 2008»
13 years 7 months ago
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas
The paper presents a detailed discussion of various issues involved in designing a medium access control (MAC) protocol for multihop wireless networks with nodes employing multiple...
Vivek Jain, Anurag Gupta, Dharma P. Agrawal
SAINT
2003
IEEE
14 years 27 days ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
JCP
2006
157views more  JCP 2006»
13 years 7 months ago
An Infrastructure for Service Oriented Sensor Networks
Emerging wireless technologies enable ubiquitous access to networked services. Integration of wireless technologies into sensor and actuator nodes provides the means for remote acc...
Åke Östmark, Jens Eliasson, Per Lindgre...