Sciweavers

447 search results - page 24 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
CLUSTER
2003
IEEE
14 years 25 days ago
HPCM: A Pre-Compiler Aided Middleware for the Mobility of Legacy Code
Mobility is a fundamental functionality of the next generation internet computing. How to support mobility for legacy codes, however, is still an issue of research. The key to sol...
Cong Du, Xian-He Sun, Kasidit Chanchio
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ADHOC
2007
104views more  ADHOC 2007»
13 years 7 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
JUCS
2010
108views more  JUCS 2010»
13 years 6 months ago
Integrating Social Networks for Context Fusion in Mobile Service Platforms
: It is important for mobile service providers to be aware of user contexts and to provide contextually relevant mobile services to users. Thereby, in this paper, we propose a nove...
Jason J. Jung
TWC
2008
176views more  TWC 2008»
13 years 7 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...