Sciweavers

1677 search results - page 280 / 336
» A distributed security scheme for ad hoc networks
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 3 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
JCM
2008
134views more  JCM 2008»
14 years 10 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
CORR
2008
Springer
128views Education» more  CORR 2008»
14 years 10 months ago
Opportunistic Collaborative Beamforming with One-Bit Feedback
An energy-efficient opportunistic collaborative beamformer with one-bit feedback is proposed for ad hoc sensor networks over Rayleigh fading channels. In contrast to conventional c...
Man-On Pun, D. Richard Brown III, H. Vincent Poor
ISPAN
2002
IEEE
15 years 2 months ago
A Self-Routing Topology for Bluetooth Scatternets
—The emerging Bluetooth standard is considered to be the most promising technology to construct ad-hoc networks. It contains specifications on how to build a piconet but left ou...
Min-Te Sun, Chung-Kuo Chang, Ten-Hwang Lai
MIDDLEWARE
2004
Springer
15 years 3 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo