Sciweavers

154 search results - page 21 / 31
» Routing with Confidence: Supporting Discretionary Routing Re...
Sort
View
JNSM
2010
110views more  JNSM 2010»
13 years 2 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
TDSC
2010
102views more  TDSC 2010»
13 years 6 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
ADHOC
2007
110views more  ADHOC 2007»
13 years 8 months ago
Hop count based optimization of Bluetooth scatternets
In the past five years Bluetooth scatternets were one of the most promising wireless networking technologies for ad hoc networking. In such networks, mobility together with the f...
Csaba Kiss Kallo, Carla-Fabiana Chiasserini, Sewoo...
CONEXT
2007
ACM
13 years 11 months ago
Scalable real-time gateway assignment in mobile mesh networks
The perception of future wireless mesh network (WMN) deployment and usage is rapidly evolving. WMNs are now being envisaged to provide citywide "last-mile" access for nu...
Edward Bortnikov, Israel Cidon, Idit Keidar
NETWORKING
2000
13 years 9 months ago
Threshold-Based Registration (TBR) in Mobile IPv6
The underlying principles of IETF Internet Draft, Mobility Support in IPv6, make it possible to employ some mechanisms to improve handoff smoothness, to maintain optimized data tra...
Linfeng Yang, Jouni Karvo, Teemu Tynjälä...