Sciweavers

643 search results - page 93 / 129
» Adaptive security for multilevel ad hoc networks
Sort
View
96
Voted
MIDDLEWARE
2004
Springer
15 years 4 months ago
A context-aware middleware for applications in mobile Ad Hoc environments
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Carl-Fredrik Sørensen, Maomao Wu, Thirunavu...
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 5 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
ESAS
2004
Springer
15 years 4 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
GLOBECOM
2008
IEEE
15 years 5 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
93
Voted
NEW2AN
2007
Springer
15 years 5 months ago
tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks
Abstract. In this paper we consider a problem of implementing a hybrid routing protocol for wireless sensor networks, which natively supports data-centric, geographic-based and add...
Evgeny Osipov