Sciweavers

270 search results - page 53 / 54
» Castor: Scalable Secure Routing for Ad Hoc Networks
Sort
View
CN
2007
117views more  CN 2007»
13 years 5 months ago
Cellular universal IP for nested network mobility
In recent years, network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO basic support protocol (NBSP), ...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
GI
2004
Springer
13 years 10 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
IJSN
2006
140views more  IJSN 2006»
13 years 5 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
ACSC
2004
IEEE
13 years 9 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ICITA
2005
IEEE
13 years 11 months ago
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...