Sciweavers

1165 search results - page 187 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
CIT
2006
Springer
15 years 5 months ago
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks
The ease of deployment and the infrastructure less nature of Mobile Ad hoc Networks (MANETs) make them highly desirable for the present day multi media communications. Traditional ...
Vinod Kone, Sukumar Nandi
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 7 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
WICON
2008
15 years 3 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
122
Voted
ICCNMC
2005
Springer
15 years 7 months ago
DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing
The emergence of Internet, Intranet, local area networks, and ad hoc wireless networks introduces a plethora of new problems in information processing. In order to overcome these p...
Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu,...
ACSAC
1998
IEEE
15 years 6 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu