Sciweavers

644 search results - page 58 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ESAS
2007
Springer
15 years 6 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
VTC
2010
IEEE
173views Communications» more  VTC 2010»
14 years 10 months ago
Streetcast: An Urban Broadcast Protocol for Vehicular Ad-Hoc Networks
—Vehicular Ad-hoc NETworks (VANETs) adopting Dedicated Short-Range Communications (DSRCs) have emerged as a preferred choice of network design for the Intelligent Transportation ...
Chih-Wei Yi, Yi-Ta Chuang, Hou-Heng Yeh, Yu-Chee T...
MOBISYS
2004
ACM
15 years 11 months ago
A Mechanism for Host Mobility Management supporting Application Awareness
Many approaches exist today that address the issues that arise when a mobile node changes its point(s) of attachment to the Internet. Mobile IP takes care of host mobility at the ...
Arjan J. H. Peddemors, Hans Zandbelt, Mortaza S. B...
PERCOM
2011
ACM
14 years 6 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis