Sciweavers

369 search results - page 29 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 8 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
AINA
2008
IEEE
15 years 8 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
ITCC
2005
IEEE
15 years 7 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 1 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham
APNOMS
2006
Springer
15 years 5 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang