Sciweavers

2209 search results - page 401 / 442
» Language Based Secure Communication
Sort
View
ESAS
2004
Springer
15 years 7 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ADHOC
2007
109views more  ADHOC 2007»
15 years 2 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
JUCS
2008
113views more  JUCS 2008»
15 years 1 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
WETICE
2008
IEEE
15 years 8 months ago
Wolf - An Eclipse Plug-In for WADE
This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development ...
Giovanni Caire, Marisa Porta, Elena Quarantotto, G...
IFIP
2007
Springer
15 years 8 months ago
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
Hybrid networks are networks capable of switching data at multiple levels (optical and IP packet level) by means of multi-service optical switches. As a result of that, huge flows...
Tiago Fioreze, Remco van de Meent, Aiko Pras