Filters








10,258 Hits in 4.7 sec

SECURE WIRELESS AD HOC NETWORKS USING ZERO KNOWLEDGE PROOF

Benfano Soewito, Yonathan Marcellinus, Manik Hapsara
2014 Journal of Computer Science  
Selection route in mobile ad-hoc network is not easy because nodes always move so that the topology of network always changed every time.  ...  This is a big issue in selection route in mobile ad-hoc network because the route can be broken anytime.  ...  Another issue in ad-hoc network is security.  ... 
doi:10.3844/jcssp.2014.2488.2493 fatcat:eerxpbwzbnd57lahs6d7vxkz3a

Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges

Valeria Loscri, Cesar Marchal, Nathalie Mitton, Giancarlo Fortino, Athanasios V. Vasilakos
2014 IEEE Transactions on Nanobioscience  
Specific issues and challenges will be considered that need ad-hoc solutions.  ...  We will discuss directions in terms of potential solutions by trying to highlight the main advantages and potential drawbacks for each direction considered.  ...  by proposing new ad-hoc approaches.  ... 
doi:10.1109/tnb.2014.2349111 pmid:25148668 fatcat:g4rvzvx23zff3mx6f6ytd26qda

On Trust Establishment in Mobile Ad-Hoc Networks [chapter]

Laurent Eschenauer, Virgil D. Gligor, John Baras
2004 Lecture Notes in Computer Science  
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet.  ...  We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments.  ...  of the ad-hoc network.  ... 
doi:10.1007/978-3-540-39871-4_6 fatcat:sob2g5ymgzht5kia5axjdwmx6a

Making space for values

Katie Shilton, Jes A. Koepfler
2013 Proceedings of the 6th International Conference on Communities and Technologies - C&T '13  
This project explores whether the virtual nature of the NDN project impacts the emergence of values levers.  ...  We then discuss the links between social values and communication practices in the values in design and virtual teams literatures.  ...  ACKNOWLEDGMENTS Many thanks to Jeff Burke and Amalia Levy for discussions which have shaped this work, and feedback on drafts of this paper.  ... 
doi:10.1145/2482991.2482993 dblp:conf/candt/ShiltonK13 fatcat:2i5pfx4gpnc5tcqv7wlhkiaaz4

Challenges in disaster relief operations: evidence from the 2017 Kermanshah earthquake

Amin Maghsoudi, Mohammad Moshtari
2020 Journal of Humanitarian Logistics and Supply Chain Management  
It also elaborates on the critical non-logistical challenges that influence aid delivery in emergency responses, including the growth of social media, regulations and the engagement of new HAs.  ...  One group of challenges relates to humanitarian logistics (HL) like needs assessment, procurement, warehousing, transportation and distribution, all widely discussed in the literature.  ...  Shared warehouses had been implemented in coordination with religious teams and ad hoc groups that did not have security teams.  ... 
doi:10.1108/jhlscm-08-2019-0054 fatcat:l2q2w3ofoffmpjkizclhlnzpfe

Semantic Web Technologies for Terrorist Network Analysis [chapter]

Jennifer Golbeck, Aaron Mannes, James Hendler
2006 Emergent Information Technologies and Enabling Policies for Counter-Terrorism  
But these ad hoc databases are often on paper, are only intelligible to their creators, and are not maintained in a formal manner.  ...  discussant mentioned an event in 1993.  ... 
doi:10.1002/047178656x.ch6 fatcat:is563sqpundnjgtvgvn5rryloe

Signal detection as the first line of defence in tourism crisis management

Alexandros Paraskevas, Levent Altinay
2013 Tourism Management  
practice and the challenges faced in each of these three stages.  ...  With this framework as a basis, 16 corporate level executives of international tourism organizations were interviewed in order to explore the significance of signal detection in their crisis management  ...  on crisis signal detection in general or in particular aspects of it such as detection network, reliability of 'ad hoc' detectors, attributes of 'core' detectors, etc.  ... 
doi:10.1016/j.tourman.2012.04.007 pmid:32287739 pmcid:PMC7115597 fatcat:6vivjktn6badbhojkmmd3ybjty

Quantum Key Management [chapter]

Peter Schartner, Stefan Rass, Martin Schaffer
2012 Applied Cryptography and Network Security  
Outlook: Towards mobile and Ad-hoc QKD networks The question, regarding the possibility of mobile or ad-hoc quantum networking, is perhaps the most promising one, which if it can be answered positively  ...  It is thus fair to assume that the connection may be temporarily unavailable and in possible misalignment for short periods of time, particularly in a mobile ad-hoc environment.  ...  Applied Cryptography and Network Security Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation  ... 
doi:10.5772/35400 fatcat:uysnzziqwngjrjwa67mlvtsjpa

ISSUES IN DEVELOPING CONTEXT AWARE INFORMATION SYSTEMS FOR HEALTH-CARE

2012 Issues in Information Systems  
This research critically examines applications of existing context aware systems, especially in health care, and discusses the issues involved in the development of such systems.  ...  In spite of that, many challenges remain to bring these systems to the mainstream of computing applications.  ...  The difficulty of smoothing workflow with traditional computer based systems lies in the fact that healthcare clinical work is characterized as being hectic, nomadic, collaborative, ad hoc and interrupted  ... 
doi:10.48009/2_iis_2012_232-237 fatcat:dne4wqdlwzh2lot6657kt2q2oa

Bridging Broadcast Encryption and Group Key Agreement [chapter]

Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
2011 Lecture Notes in Computer Science  
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but requires a trusted party to distribute decryption keys.  ...  The aggregatability property is shown to be useful to construct advanced protocols.  ...  (e.g., some ad hoc network applications).  ... 
doi:10.1007/978-3-642-25385-0_8 fatcat:vy5i2x6tdnbnnlm2hverdjlnxa

Service-oriented middleware for the Future Internet: state of the art and research directions

Valérie Issarny, Nikolaos Georgantas, Sara Hachem, Apostolos Zarras, Panos Vassiliadist, Marco Autili, Marco Aurélio Gerosa, Amira Ben Hamida
2011 Journal of Internet Services and Applications  
Hachem INRIA, key research directions to be followed in light of the latest state of the art.  ...  However, the evolution of the Internet, and in particular, the latest Future Internet vision, challenges the paradigm.  ...  Marco Gerosa receives individual grant from CNPq and his work is also supported by HP, by means of the Baile Project.  ... 
doi:10.1007/s13174-011-0021-3 fatcat:smyeiarghbhapgfzuig2j4iavq

Towards a Framework for Strategic Security Context in Information Security Governance

Sean B Maynard, Terrence Tan, Atif Ahmad, Tobias Ruighaver
2018 Pacific Asia Journal of the Association for Information Systems  
Information security governance influences the quality of strategic decision-making to ensure that investments in security are effective.  ...  These are (1) limited diversity in decision-making; (2) lack of guidance in corporate-level mission statements to security decision-makers; (3) a bottomup approach to security strategic context development  ...  Security initiatives at MCL have been 'organically' grown and ad hoc.  ... 
doi:10.17705/1pais.10403 fatcat:5xmzpfancreg3phvahezfjc4uu

Vehicle Authentication via Monolithically Certified Public Key and Attributes [article]

Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
2015 arXiv   pre-print
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers).  ...  We illustrate the security verification of the proposed protocol using a detailed proof in Spi calculus.  ...  In the scope of vehicle (ad-hoc) networks, secure interaction among the peer vehicles should be established rapidly without any third party assistance.  ... 
arXiv:1507.04491v1 fatcat:iusbs77tyjhjpedmemmu5xh4ui

The function of intermediaries in collaborative innovation processes: retrofitting a Danish small island ferry with green technology

Roberto Rivas Hermann, Mette Mosgaard, Søren Kerndrup
2016 International Journal of Innovation and Sustainable Development  
However, intermediaries can also have a proactive role in shaping the emerging innovation pathways.  ...  They can provide functions to the incipient network as foresight, brokering, increasing network connectivity, and scanning of information.  ...  The authors also acknowledge the staff of the Maritime Center for Operation and Development (MARCOD, Denmark) for their support with empirical materials and contacts during the preparation of the case  ... 
doi:10.1504/ijisd.2016.079581 fatcat:6jywavvrizgfviysci62triilq

The function of intermediaries in collaborative innovation processes: retrofitting a Danish small island ferry with green technology

Søren Kerndrup, Mette Mosgaard, Roberto Rivas Hermann
2016 International Journal of Innovation and Sustainable Development  
However, intermediaries can also have a proactive role in shaping the emerging innovation pathways.  ...  They can provide functions to the incipient network as foresight, brokering, increasing network connectivity, and scanning of information.  ...  The authors also acknowledge the staff of the Maritime Center for Operation and Development (MARCOD, Denmark) for their support with empirical materials and contacts during the preparation of the case  ... 
doi:10.1504/ijisd.2016.10000445 fatcat:ljdrf6hivfexvcpgyaez36r5ta
« Previous Showing results 1 — 15 out of 10,258 results