Sciweavers

2846 search results - page 51 / 570
» Personalization of a Trust Network
Sort
View
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 4 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo
NETWORKING
2004
14 years 11 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
WWIC
2010
Springer
183views Communications» more  WWIC 2010»
15 years 3 months ago
Enhanced Mobility Support for Roaming Users: Extending the IEEE 802.21 Information Service
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...
AAAI
1996
14 years 11 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski
SIGOPSE
2000
ACM
15 years 2 months ago
Deferring trust in fluid replication
Mobile nodes rely on external services to provide safety, sharing, and additional resources. Unfortunately, as mobile nodes move through the networking infrastructure, the costs o...
Brian D. Noble, Ben Fleis, Landon P. Cox