Sciweavers

851 search results - page 35 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
IJNSEC
2008
160views more  IJNSEC 2008»
13 years 9 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
ADHOC
2007
104views more  ADHOC 2007»
13 years 9 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
IDEAS
2002
IEEE
223views Database» more  IDEAS 2002»
14 years 1 months ago
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks
Energy saving is the most important issue in wireless mobile computing due to power constraints on mobile units. Data broadcasting is the main method of information dissemination ...
Le Gruenwald, Muhammad Javed, Meng Gu
ADHOCNOW
2004
Springer
14 years 2 months ago
Routing Table Dynamics in Mobile Ad-Hoc Networks: A Continuum Model
Abstract. This paper gives a simple continuum model for generic proactive routing protocols in a mobile ad-hoc network. Rate constants characterize the routing protocol and the net...
Ernst W. Grundke