Sciweavers

644 search results - page 97 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
AINA
2007
IEEE
15 years 6 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
MIDDLEWARE
2005
Springer
15 years 5 months ago
INDISS: Interoperable Discovery System for Networked Services
Abstract. The emergence of handheld devices associated with wireless technologies has introduced new challenges for middleware. First, mobility is becoming a key characteristic; mo...
Yérom-David Bromberg, Valérie Issarn...
WICON
2008
15 years 1 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
ICCHP
2004
Springer
15 years 5 months ago
Networking and Communication in Smart Home for People with Disabilities
People with disabilities need several assistive technical aids to increase their autonomy and perform daily living tasks. This paper describes the role of networking and communicat...
Mahmoud Ghorbel, Maria-Teresa Segarra, Jéro...
ATC
2007
Springer
15 years 6 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...