Sciweavers

1862 search results - page 341 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
EZCab: A Cab Booking Application Using Short-Range Wireless Communication
EZCab is a proof-of-concept ubiquitous computing application that allows people to book nearby cabs using their cell phones or PDAs equipped with short-range wireless network inte...
Peng Zhou, Tamer Nadeem, Porlin Kang, Cristian Bor...
IWCMC
2009
ACM
15 years 4 months ago
Scheduling cooperative emergency response: or how the meek shall overcome the greedy
We consider the problem of scheduling emergency responders to geospatially located finite duration temporally bounded tasks. We consider two different schedulers, Greedy and Mee...
Carol Dottin, Bilal Khan
WICON
2008
15 years 23 days ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
97
Voted
SIGCOMM
2012
ACM
13 years 1 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 4 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay