๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks

โœ Scribed by Chigan, C.; Li, L.; Ye, Y.


Book ID
114443599
Publisher
The Institution of Engineering and Technology
Year
2007
Tongue
English
Weight
407 KB
Volume
1
Category
Article
ISSN
1751-8709

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


An optimised resource aware approach to
โœ Justin Lipman; Mehran Abolhasan; Paul Boustead; Joe Chicharo ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 373 KB

In ad hoc networks there is a need for all-to-one protocols that allow for information collection or ''sensing'' of the state of an ad hoc network and the nodes that comprise it. Such protocols may be used for service discovery, auto-configuration, network management, topology discovery or reliable

Computationally secure self-healing key
โœ Ratna Dutta; Sourav Mukhopadhyay; Martin Collier ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 508 KB

This paper introduces a novel self-healing technique for key distribution with revocation and demonstrates how it improves the efficiency over the previous approaches while using the existing idea of secret sharing or revocation polynomial in designing self-healing key distribution schemes with revo