Sciweavers

447 search results - page 14 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
LCN
2008
IEEE
14 years 1 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
CN
2007
124views more  CN 2007»
13 years 7 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
GLOBECOM
2009
IEEE
13 years 5 months ago
Cooperative Uplink of Two Mobile Stations with Network Coding Based on the WiMax LDPC Code
We consider the uplink of two mobile stations with the help of one common relay. Recently, joint network-channel coding based on LDPC codes was proposed for this setup where the ch...
Lena Chebli, Christoph Hausl, Georg Zeitler, Ralf ...
CCGRID
2007
IEEE
14 years 1 months ago
A Hierarchical Two-Tier Information Management Architecture for Mobile Ad-Hoc Grid Environments
A novel management layer architecture for mobile grid environments and ad-hoc networks is presented. This paper addresses a key challenge in dynamic mobile environments with a hig...
Joachim Zottl, Wilfried N. Gansterer, Helmut Hlava...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Implementing incremental code migration with XML
We demonstrate how XML and related technologies can be used for code mobility at any granularity, thus overcoming the restrictions of existing approaches. By not fixing a particul...
Wolfgang Emmerich, Cecilia Mascolo, Anthony Finkel...