Sciweavers

745 search results - page 60 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
SIGOPSE
2000
ACM
14 years 1 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
E4MAS
2004
Springer
14 years 2 months ago
Supporting Context-Aware Interaction in Dynamic Multi-agent Systems
The increasing ubiquity of mobile computing devices has made mobile ad hoc networks an everyday occurrence. Applications in these networks are commonly structured as a logical netw...
Christine Julien, Gruia-Catalin Roman
APNOMS
2007
Springer
14 years 2 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
SAC
2006
ACM
14 years 2 months ago
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts
We solve the consensus problem using a new class of broadcasts that are very appropriate to ad-hoc networking: every broadcast message is eventually ensured to be garbagecollected...
François Bonnet, Paul D. Ezhilchelvan, Eina...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 8 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja