Sciweavers

529 search results - page 86 / 106
» Cluster based Key Management in Wireless Sensor Networks
Sort
View
SENSYS
2006
ACM
15 years 3 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
CN
2006
127views more  CN 2006»
14 years 9 months ago
A survey on communication networks for electric system automation
In today' s competitive electric utility marketplace, real-time information becomes the key factor for reliable delivery of power to the end-users, profitability of the electr...
Vehbi C. Gungor, Frank C. Lambert
ESAS
2006
Springer
15 years 1 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
CCGRID
2007
IEEE
15 years 4 months ago
A Hierarchical Two-Tier Information Management Architecture for Mobile Ad-Hoc Grid Environments
A novel management layer architecture for mobile grid environments and ad-hoc networks is presented. This paper addresses a key challenge in dynamic mobile environments with a hig...
Joachim Zottl, Wilfried N. Gansterer, Helmut Hlava...
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...