Sciweavers

1894 search results - page 232 / 379
» Towards Mobile Reasoning
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
IJNSEC
2008
152views more  IJNSEC 2008»
15 years 4 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
IJHPCN
2006
151views more  IJHPCN 2006»
15 years 4 months ago
Adaptive local searching and caching strategies for on-demand routing protocols in ad hoc networks
: On-demand routing protocols are widely used in mobile ad hoc networks due to their capability of adjusting to frequent network topology changes within acceptable routing overhead...
Zhao Cheng, Wendi B. Heinzelman
JNW
2006
174views more  JNW 2006»
15 years 4 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
RAS
2006
199views more  RAS 2006»
15 years 4 months ago
Cooperative hole avoidance in a swarm-bot
In this paper, we study coordinated motion in a swarm robotic system, called a swarm-bot. A swarm-bot is a self-assembling and self-organising artifact, composed of a swarm of s-b...
Vito Trianni, Stefano Nolfi, Marco Dorigo