Sciweavers

745 search results - page 109 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
FI
2010
143views more  FI 2010»
13 years 3 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
PERCOM
2006
ACM
14 years 8 months ago
Resource Allocation in Wireless Networks Using Directional Antennas
With the continued increase of speed and capacities of computing devices and the growing needs of people for mobile computing capabilities, Mobile ad hoc networks (MANETs) have gai...
Imad Jawhar, Jie Wu
CONEXT
2007
ACM
14 years 24 days ago
Scalable real-time gateway assignment in mobile mesh networks
The perception of future wireless mesh network (WMN) deployment and usage is rapidly evolving. WMNs are now being envisaged to provide citywide "last-mile" access for nu...
Edward Bortnikov, Israel Cidon, Idit Keidar
ICCHP
2004
Springer
14 years 2 months ago
Networking and Communication in Smart Home for People with Disabilities
People with disabilities need several assistive technical aids to increase their autonomy and perform daily living tasks. This paper describes the role of networking and communicat...
Mahmoud Ghorbel, Maria-Teresa Segarra, Jéro...