Sciweavers

10044 search results - page 144 / 2009
» Authentication in Wireless Networks
Sort
View
NETWORK
2011
14 years 6 months ago
Energy-efficient wireless mesh infrastructures
Yahya Al-Hazmi, Hermann de Meer, Karin A. Hummel, ...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 5 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
MOBICOM
1998
ACM
15 years 3 months ago
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
WMI
2001
114views more  WMI 2001»
15 years 1 months ago
A high capacity multihop packet CDMA wireless network
: An adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Ali Nabi Zadeh, Bijan Jabbari
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 1 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan