pc.sagepub.com/cgi/content/abstract/22/1/33 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal ...
Bronis R. de Supinski, Martin Schulz, Vasily Bulat...
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Distributed Virtual Environment (DVE) systems have been designed last years as a set of distributed servers. These systems allow a large number of remote users to share a single 3...
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...