Sciweavers

643 search results - page 105 / 129
» Adaptive security for multilevel ad hoc networks
Sort
View
GLOBECOM
2010
IEEE
14 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
NBIS
2009
Springer
15 years 4 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
ICC
2009
IEEE
167views Communications» more  ICC 2009»
14 years 7 months ago
Efficient Adaptive Routing in Delay Tolerant Networks
Conventional routing algorithms in mobile ad hoc networks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalabl...
Cong Liu, Jie Wu
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ICC
2007
IEEE
102views Communications» more  ICC 2007»
15 years 3 months ago
Decentralized Interference Aware Link Adaptation Using Busy Bursts
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...