Sciweavers

11 search results - page 2 / 3
» Role-Based Protection and Delegation for Mobile Object Envir...
Sort
View
WCNC
2008
IEEE
13 years 11 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
TPDS
2010
256views more  TPDS 2010»
13 years 3 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
IPPS
2006
IEEE
13 years 10 months ago
Babylon v2.0: middleware for distributed, parallel, and mobile Java applications
Babylon v2.0 is a collection of tools and services that provide a 100% Java compatible environment for developing, running and managing parallel, distributed and mobile Java appli...
Willem van Heiningen, Tim Brecht, Steve MacDonald
PEWASUN
2004
ACM
13 years 10 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
COMCOM
2007
156views more  COMCOM 2007»
13 years 4 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis