Sciweavers

1677 search results - page 241 / 336
» A distributed security scheme for ad hoc networks
Sort
View
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 4 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
INFOCOM
2007
IEEE
15 years 4 months ago
Self-Adaptive On Demand Geographic Routing Protocols for Mobile Ad-hoc Networks
— It has been a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc n...
X. Xiang, Z. Zhou, X. Wang
ICCSA
2005
Springer
15 years 3 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
CISS
2008
IEEE
15 years 4 months ago
Resource allocation algorithms for multiuser cooperative OFDMA systems with subchannel permutation
— In this paper, we investigate resource allocation for a multi-user OFDMA cooperative system. Aiming at minimizing the total transmission power under target rate constraints for...
Bo Gui, Leonard J. Cimini Jr.
WOSS
2004
ACM
15 years 3 months ago
An extensible framework for autonomic analysis and improvement of distributed deployment architectures
A distributed software system’s deployment architecture can have a significant impact on the system’s properties, which depend on various system parameters, such as network ba...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic