Sciweavers

2691 search results - page 379 / 539
» Security in Ad Hoc Networks
Sort
View
ASIACRYPT
2008
Springer
14 years 10 days ago
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
ICCSA
2004
Springer
14 years 3 months ago
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
We propose a hierarchical, cluster based semi-distributed routing protocol for a mobile ad hoc network. The network graph is partitioned into clusters using heuristics and the shor...
Kayhan Erciyes, Geoffrey Marshall
BROADNETS
2004
IEEE
14 years 2 months ago
Science of Continuous Media Application Design in Wireless Networks of Mobile Devices
Display of continuous media using self-organizing ad hoc networks of wireless communication systems will potentially be used in a variety of applications. Example deployments migh...
Shahram Ghandeharizadeh
ALGOSENSORS
2004
Springer
14 years 3 months ago
A Distributed TDMA Slot Assignment Algorithm for Wireless Sensor Networks
Abstract. Wireless sensor networks benefit from communication protocols that reduce power requirements by avoiding frame collision. Time Division Media Access methods schedule tra...
Ted Herman, Sébastien Tixeuil
GROUP
2003
ACM
14 years 3 months ago
Supporting activity-centric collaboration through peer-to-peer shared objects
We describe a new collaborative technology that is mid-way between the informality of email and the formality of shared workspaces. Email and other ad hoc collaboration systems ar...
Werner Geyer, Jürgen Vogel, Li-Te Cheng, Mich...