Sciweavers

1321 search results - page 241 / 265
» On the Age of Pseudonyms in Mobile Ad Hoc Networks
Sort
View
EUROPAR
2006
Springer
13 years 11 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...
WMASH
2004
ACM
14 years 1 months ago
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a multibillion dollars market. Yet many consumers consider that the price cellular netwo...
Márk Félegyházi, Srdjan Capku...
WCNC
2008
IEEE
14 years 2 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 2 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
ACISP
2006
Springer
14 years 1 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros