Abstract—Context-aware applications adapt to changing computing environments or changing user circumstances/tasks. Context information that supports such adaptations is provided ...
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...