Sciweavers

1677 search results - page 239 / 336
» A distributed security scheme for ad hoc networks
Sort
View
SASN
2004
ACM
15 years 3 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
COMSWARE
2006
IEEE
15 years 1 months ago
M2MC: Middleware for many to many communication over broadcast networks
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
Chaitanya Krishna Bhavanasi, Sridhar Iyer
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 2 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
JPDC
2008
127views more  JPDC 2008»
14 years 10 months ago
E-ODMRP: Enhanced ODMRP with motion adaptive refresh
On Demand Multicast Routing Protocol (ODMRP) is a multicast routing protocol for mobile ad hoc networks. Its efficiency, simplicity, and robustness to mobility render it one of th...
Soon-Young Oh, Joon-Sang Park, Mario Gerla
JCP
2006
151views more  JCP 2006»
14 years 10 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic