Sciweavers

369 search results - page 41 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
134
Voted
AINA
2004
IEEE
15 years 7 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
109
Voted
CORR
2007
Springer
138views Education» more  CORR 2007»
15 years 3 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
IEEEARES
2008
IEEE
15 years 10 months ago
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors
—Failure detectors are a fundamental part of safe fault-tolerant distributed systems. Many failure detectors use heartbeats to draw conclusions about the state of nodes within a ...
Benjamin Satzger, Andreas Pietzowski, Wolfgang Tru...
121
Voted
IFIP
2004
Springer
15 years 9 months ago
Low-Latency Non-predictive Handover Scheme in Mobile IPv6 Environments
In IP-based wireless/mobile networks, minimizing handover latency is one of the most important issues. Fast handover mobile IPv6 (FMIPv6) reduces the handover latency by handover p...
Geunhyung Kim, Cheeha Kim
PERCOM
2005
ACM
16 years 3 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...