Sciweavers

674 search results - page 28 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
APNOMS
2007
Springer
15 years 3 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
DPD
2008
136views more  DPD 2008»
14 years 9 months ago
A cache invalidation scheme for continuous partial match queries in mobile computing environments
The continuous partial match query is a partial match query whose result remains consistently in the client's memory. Conventional cache invalidation methods for mobile client...
Yon Dohn Chung
OSDI
2004
ACM
15 years 10 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
CCS
2003
ACM
15 years 2 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
ICDCSW
2007
IEEE
14 years 9 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...