Sciweavers

109 search results - page 5 / 22
» comcom 2006
Sort
View
COMCOM
2006
70views more  COMCOM 2006»
13 years 5 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
COMCOM
2006
115views more  COMCOM 2006»
13 years 5 months ago
Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance
There exists a high demand for reliable, high capacity underwater acoustic networks to allow efficient data gathering and information exchange. This is evidenced by significant re...
Mihaela Cardei
COMCOM
2006
123views more  COMCOM 2006»
13 years 5 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
COMCOM
2006
120views more  COMCOM 2006»
13 years 5 months ago
Energy efficient routing and scheduling for real-time data aggregation in WSNs
In this paper, we study the problem of constructing an energy efficient data aggregation tree for data gathering in wireless sensor networks. We consider a real-time scenario wher...
Hongwei Du, Xiaodong Hu, Xiaohua Jia
COMCOM
2006
75views more  COMCOM 2006»
13 years 5 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin