Sciweavers

576 search results - page 93 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
JCS
2007
84views more  JCS 2007»
14 years 11 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
SMARTNET
2000
15 years 1 months ago
MobiliTools: An OMG Standards-Based Toolbox for Agent Mobility and Interoperability
: One of the keys to success for applications of mobile and/or intelligent agents in large-scale open systems such as Internet is the ability of heterogeneous agents to cooperate a...
Bruno Dillenseger
SUTC
2006
IEEE
15 years 5 months ago
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors ...
Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. ...
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 4 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
ESORICS
2010
Springer
15 years 24 days ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...