Sciweavers

775 search results - page 114 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
CISIS
2009
IEEE
15 years 8 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
INFOCOM
2006
IEEE
15 years 8 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
AAAI
2004
15 years 3 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
ISCI
2007
134views more  ISCI 2007»
15 years 1 months ago
A location-aware multicasting protocol for Bluetooth Location Networks
Bluetooth Location Network (BLN) is a Bluetooth radio network that is composed of some mobile Bluetooth devices and static Bluetooth units, and is established at the system initia...
Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, ...
PERCOM
2009
ACM
16 years 2 months ago
Video Ads Dissemination through WiFi-Cellular Hybrid Networks
In this paper, we propose a method for video ads dissemination through a hybrid network consisting of WiFi and cellular networks, in order to provide timely delivery of video ads w...
Hiroshi Hanano, Yoshihiro Murata, Naoki Shibata, K...