Sciweavers

745 search results - page 60 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
SIGOPSE
2000
ACM
15 years 8 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
E4MAS
2004
Springer
15 years 9 months ago
Supporting Context-Aware Interaction in Dynamic Multi-agent Systems
The increasing ubiquity of mobile computing devices has made mobile ad hoc networks an everyday occurrence. Applications in these networks are commonly structured as a logical netw...
Christine Julien, Gruia-Catalin Roman
APNOMS
2007
Springer
15 years 10 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
SAC
2006
ACM
15 years 10 months ago
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts
We solve the consensus problem using a new class of broadcasts that are very appropriate to ad-hoc networking: every broadcast message is eventually ensured to be garbagecollected...
François Bonnet, Paul D. Ezhilchelvan, Eina...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja