Sciweavers

1351 search results - page 208 / 271
» Trust in Anonymity Networks
Sort
View
AINA
2005
IEEE
15 years 3 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
INFOCOM
2005
IEEE
15 years 3 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ESWS
2008
Springer
14 years 11 months ago
xOperator - An Extensible Semantic Agent for Instant Messaging Networks
Instant Messaging is in addition to Web and Email the most popular service on the Internet. With xOperator we demonstrate the implementation of a strategy which deeply integrates I...
Sebastian Dietzold, Jörg Unbehauen, Söre...
ESWS
2008
Springer
14 years 11 months ago
xOperator - Interconnecting the Semantic Web and Instant Messaging Networks
Instant Messaging (IM) is in addition to Web and Email the most popular service on the Internet. With xOperator we present a strategy and implementation which deeply integrates Ins...
Sebastian Dietzold, Jörg Unbehauen, Söre...