Sciweavers

745 search results - page 72 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
CN
2006
97views more  CN 2006»
13 years 8 months ago
Fault tolerance for home agents in mobile IP
In the conventional IP protocol, whenever a mobile device moves to a different network, it must change its IP address to communicate with other nodes in the Internet. Mobile IP pr...
Yin-Fu Huang, Min-Hsiu Chuang
INFOCOM
2010
IEEE
13 years 7 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
14 years 15 days ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
IPCCC
2005
IEEE
14 years 2 months ago
Dynamic localization control for mobile sensor networks
Localization is a fundamental operation in mobile and self-configuring networks such as sensor networks and mobile ad hoc networks. For example, sensor location is often critical...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
ISCAS
2002
IEEE
139views Hardware» more  ISCAS 2002»
14 years 1 months ago
Mobility support for Bluetooth public access
Bluetooth technology offers the potential for low-cost, broadband wireless access for a range of mobile and portable devices. It can thus provide for ubiquitous computing across a...
A. Kansal, Uday B. Desai