Sciweavers

674 search results - page 21 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ICDCS
2000
IEEE
15 years 1 months ago
An Efficient Cache Maintenance Scheme for Mobile Environment
In this paper we present a new cache maintenance scheme, called AS, suitable for wireless mobile environment. Our scheme integrates mobility management scheme of Mobile IP with ca...
Anurag Kahol, Ramandeep Singh Khurana, Sandeep K. ...
APNOMS
2006
Springer
15 years 1 months ago
A Seamless Service Management with Context-Aware Handoff Scheme in Ubiquitous Computing Environment
Abstract. Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity has not been considered properly. To provide seamless connecti...
Tae-Hoon Kang, Chung-Pyo Hong, Won-Joo Jang, Shin-...
82
Voted
ICN
2005
Springer
15 years 3 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
ADHOCNOW
2006
Springer
15 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang