Sciweavers

447 search results - page 27 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
FTDCS
2004
IEEE
13 years 11 months ago
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications
Peer-to-peer (P2P) networks and mobile ad hoc networks (MANET) share some key characteristics: selforganization and decentralization, and both need to solve the same fundamental p...
Lu Yan, Kaisa Sere, Xinrong Zhou, Jun Pang
DCOSS
2008
Springer
13 years 9 months ago
Techniques for Improving Opportunistic Sensor Networking Performance
Abstract. A number of recently proposed mobile sensor network architectures rely on uncontrolled, or weakly-controlled mobility to achieve sensing coverage over time at low cost, a...
Shane B. Eisenman, Nicholas D. Lane, Andrew T. Cam...
ACSAC
1999
IEEE
13 years 12 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
EUROPAR
2007
Springer
14 years 1 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
FOSSACS
2004
Springer
14 years 28 days ago
safeDpi: A Language for Controlling Mobile Code
safeDpi is a distributed version of the Picalculus, in which processes are located at dynamically created sites. Parametrised code may be sent between sites using so-called ports, ...
Matthew Hennessy, Julian Rathke, Nobuko Yoshida