Sciweavers

644 search results - page 110 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
135
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
WIMOB
2009
IEEE
15 years 6 months ago
Multipath Routing in MANETs Using Multiple Description Coding
—Routing in ad hoc networks is a well known issue. Most of the previous propositions to route data between two nodes aimed to define a path (sometimes several ones) on which pac...
Eddy Cizeron, Salima Hamma
WONS
2005
IEEE
15 years 5 months ago
Co-operative Downloading in Vehicular Ad-Hoc Wireless Networks
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...
WMASH
2005
ACM
15 years 5 months ago
A multimedia guidebook implementation using a bluetooth wireless information point network
This paper describes the implementation of a Bluetooth Village Guide Book (VGB) scenario for use in the Kelvin Grove Urban Village located in Brisbane, Australia. An Information P...
Matthew D'Souza, Adam Postula, Neil Bergmann, Mont...
96
Voted
IPPS
2008
IEEE
15 years 6 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...