Sciweavers

636 search results - page 93 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
SECON
2008
IEEE
14 years 2 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...
SCN
2008
Springer
13 years 8 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
ESCIENCE
2007
IEEE
13 years 10 months ago
The Ring Buffer Network Bus (RBNB) DataTurbine Streaming Data Middleware for Environmental Observing Systems
— The environmental science and engineering communities are actively engaged in planning and developing the next generation of large-scale sensor-based observing systems. These s...
Sameer Tilak, Paul Hubbard, Matt Miller, Tony Foun...
MOBISYS
2008
ACM
13 years 10 months ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
MOBISYS
2007
ACM
14 years 8 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti