Sciweavers

644 search results - page 104 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ICDCSW
2005
IEEE
15 years 5 months ago
Parallel Bindings in Distributed Multimedia Systems
Today’s multimedia environments are characterized by different stationary and a growing number of mobile devices, like PDAs or even mobile phones. To meet their requirements reg...
Michael Repplinger, Florian Winter, Marco Lohse, P...
ESAS
2004
Springer
15 years 5 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
ICDCSW
2009
IEEE
15 years 6 months ago
Dynamic TCP Proxies: Coping with Disadvantaged Hosts in MANETs
Applications in mobile ad-hoc networks can suffer from poor link quality and degraded network services. In particular, standard TCP over low-quality, long routing paths, can have ...
Tu Ouyang, Shudong Jin, Michael Rabinovich
ESAS
2007
Springer
15 years 6 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
IWCMC
2006
ACM
15 years 5 months ago
Cross-layer performance analysis of joint rate and power adaptation schemes with multiple-user contention in Nakagami fading cha
Adaptively adjusting transmission rate and power to concurrently enhance goodput and save energy is an important issue in the wireless local area network (WLAN). However, goodput ...
Li-Chun Wang, Kuang-Nan Yen, Jane-Hwa Huang, Ander...