Sciweavers

712 search results - page 65 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICOIN
2001
Springer
15 years 2 months ago
Web-Based Distributed Topology Discovery of IP Networks
For the purpose of distributed network management, this paper employs a Web-based distributed network management architecture which uses the same HTTP protocol to download Java ap...
Hwa-Chun Lin, Yi-Fan Wang, Chien-Hsing Wang, Chien...
ICNP
2006
IEEE
15 years 3 months ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora
COMCOM
2007
104views more  COMCOM 2007»
14 years 9 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
ICNP
2006
IEEE
15 years 3 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...