Sciweavers

10 search results - page 1 / 2
» Security challenges in seamless mobility: how to "hando...
Sort
View
WICON
2008
13 years 6 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
ICDCSW
2003
IEEE
13 years 9 months ago
Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs ar...
Gang Xu, Cristian Borcea, Liviu Iftode
WS
2005
ACM
13 years 10 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
IJSN
2008
114views more  IJSN 2008»
13 years 4 months ago
Adaptive clustering for scalable key management in dynamic group communications
: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
IASTEDSE
2004
13 years 6 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...