Sciweavers

634 search results - page 97 / 127
» Secure time synchronization service for sensor networks
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
On the Suitability of Applications for GMPLS Networks
— After identifying that current GMPLS specifications only allow for the implementation of a call blocking mode of operation that handles immediate-request calls (not book-ahead...
Malathi Veeraraghavan, Xiuduan Fang, Xuan Zheng
SIROCCO
2010
14 years 11 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
VTC
2006
IEEE
15 years 3 months ago
Proposition of a full deterministic medium access method for wireless network in a robotic application
—Today, many network applications require shorter react time. Robotic field is an excellent example of these needs: robot react time has a direct effect on its task’s complexit...
Adrien van den Bossche, Thierry Val, Eric Campo
EUROPKI
2004
Springer
15 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
SIGCOMM
1998
ACM
15 years 1 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam