Sciweavers

574 search results - page 68 / 115
» Message delay in MANET
Sort
View
ACSAC
1999
IEEE
15 years 9 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
CCS
2006
ACM
15 years 8 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
SIGMOBILE
2008
86views more  SIGMOBILE 2008»
15 years 4 months ago
Profile-cast: behavior-aware mobile networking
In this paper we advocate a service paradigm, profile-cast, within the communication framework of delay tolerant networks (DTN)[2]. This novel approach leverages the behavioral pat...
Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy
178
Voted
DCOSS
2011
Springer
14 years 4 months ago
Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs
—Controlled sink mobility has been shown to be very beneficial in lifetime prolongation of wireless sensor networks (WSNs) by avoiding the typical hot-spot problem near the sink...
Wint Yi Poe, Michael Beck, Jens B. Schmitt
INFOCOM
2007
IEEE
15 years 11 months ago
A Graph-Based Model for Disconnected Ad Hoc Networks
— Recently, research on disconnected networks has been fostered by several studies on delay-tolerant networks, which are designed in order to sustain disconnected operations. We ...
Francesco De Pellegrini, Daniele Miorandi, Iacopo ...