Sciweavers

745 search results - page 55 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
CORR
2004
Springer
106views Education» more  CORR 2004»
13 years 8 months ago
Roaming Real-Time Applications - Mobility Services in IPv6 Networks
Emerging mobility standards within the next generation Internet Protocol, IPv6, promise to continuously operate devices roaming between IP networks. Associated with the paradigm o...
Thomas C. Schmidt, Matthias Wählisch
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 8 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
CN
2008
192views more  CN 2008»
13 years 8 months ago
Research on multicast routing protocols for mobile ad-hoc networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to ext...
Junhai Luo, Xue Liu, Danxia Ye
AINA
2005
IEEE
14 years 2 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan