Sciweavers

447 search results - page 50 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
AMS
2007
Springer
229views Robotics» more  AMS 2007»
14 years 24 days ago
A Unified Robotic Software Architecture for Service Robotics and Networks of Smart Sensors
Abstract. This paper proposes a novel architecture for the programming of multi-modal service robots and networked sensors. The presented software framework eases the development o...
Daniel Westhoff, Jianwei Zhang
ICDCSW
2002
IEEE
14 years 1 months ago
Peer-to-Peer for Collaborative Applications
Peer-to-peer systems recently captured the attention of practitioners and researchers as they provide an attractive alternative to client-server architectures. Peerto-peer enables...
Gianpaolo Cugola, Gian Pietro Picco
SUTC
2006
IEEE
14 years 2 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ESAS
2007
Springer
14 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...