Sciweavers

231 search results - page 6 / 47
» Authentication across heterogeneous networks
Sort
View
MOBISYS
2006
ACM
15 years 9 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
CN
2007
115views more  CN 2007»
14 years 9 months ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi
68
Voted
VRML
2005
ACM
15 years 3 months ago
Visualization across the pond: how a wireless PDA can collaborate with million-polygon datasets via 9, 000km of cable
We present an initial report on using our distributed, collaborative grid enabled visualization environment to link SuperComputing 2004 (Pittsburgh, PA, USA) with the Cardiff Scho...
Ian J. Grimstead, Nick J. Avis, David W. Walker
NOSSDAV
2009
Springer
15 years 4 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda
LCN
2006
IEEE
15 years 3 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang