Sciweavers

24 search results - page 4 / 5
» Bootstrapping an Infrastructure
Sort
View
136
Voted
ESAS
2007
Springer
15 years 8 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
GC
2004
Springer
15 years 7 months ago
BGP-Based Clustering for Scalable and Reliable Gossip Broadcast
This paper presents a locality-based dissemination graph algorithm for scalable reliable broadcast. Our algorithm scales in terms of both network and memory usage. Processes only h...
M. Brahami, Patrick Th. Eugster, Rachid Guerraoui,...
NDSS
2002
IEEE
15 years 6 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
129
Voted
CN
2007
172views more  CN 2007»
15 years 1 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
PERCOM
2010
ACM
15 years 7 days ago
Crowdsourced radiomap for room-level place recognition in urban environment
Abstract—The proliferation of WLAN infrastructures has facilitated numerous indoor localization techniques using WLAN fingerprints. In particular, identifying a room or a place i...
Minkyu Lee, Hyunil Yang, Dongsoo Han, Chansu Yu