Sciweavers

745 search results - page 87 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
WOWMOM
2005
ACM
148views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks
Both Mobile Ad Hoc Networks (MANETs) and Peer-toPeer (P2P) Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a d...
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel ...
FAST
2003
13 years 10 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
ICALP
2009
Springer
14 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
HUC
2009
Springer
14 years 1 months ago
A Survey on Localization for Mobile Wireless Sensor Networks
Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspe...
Isaac Amundson, Xenofon D. Koutsoukos
ACSC
2007
IEEE
14 years 3 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...