Sciweavers

252 search results - page 43 / 51
» Secure Group Key Management Scheme for Multicast Networks
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 7 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
ACSC
2007
IEEE
14 years 1 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
TWC
2010
13 years 2 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
CCGRID
2011
IEEE
12 years 11 months ago
GeoServ: A Distributed Urban Sensing Platform
—Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a ne...
Jong Hoon Ahnn, Uichin Lee, Hyun Jin Moon
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...