Sciweavers

674 search results - page 14 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
COMPUTER
2008
90views more  COMPUTER 2008»
14 years 9 months ago
Challenges and Lessons in Developing Middleware on Smart Phones
Near-ubiquitous smart phones are the most promising heralds of future pervasive computing. However, despite their increasing capabilities in computation, communication, and sensin...
Oriana Riva, Jaakko Kangasharju
73
Voted
IPPS
2005
IEEE
15 years 3 months ago
A Lightweight Scheme for Auto-configuration in Mobile Ad Hoc Networks
An efficient addressing scheme is necessary for auto-configuration and seamless communication in pervasive computing environments. In this paper, we propose an efficient and simple...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
EDBT
2010
ACM
147views Database» more  EDBT 2010»
15 years 4 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...
TWC
2008
176views more  TWC 2008»
14 years 9 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 9 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao