A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
SECURE WIRELESS AD HOC NETWORKS USING ZERO KNOWLEDGE PROOF
2014
Journal of Computer Science
Selection route in mobile ad-hoc network is not easy because nodes always move so that the topology of network always changed every time. ...
This is a big issue in selection route in mobile ad-hoc network because the route can be broken anytime. ...
Another issue in ad-hoc network is security. ...
doi:10.3844/jcssp.2014.2488.2493
fatcat:eerxpbwzbnd57lahs6d7vxkz3a
Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges
2014
IEEE Transactions on Nanobioscience
Specific issues and challenges will be considered that need ad-hoc solutions. ...
We will discuss directions in terms of potential solutions by trying to highlight the main advantages and potential drawbacks for each direction considered. ...
by proposing new ad-hoc approaches. ...
doi:10.1109/tnb.2014.2349111
pmid:25148668
fatcat:g4rvzvx23zff3mx6f6ytd26qda
On Trust Establishment in Mobile Ad-Hoc Networks
[chapter]
2004
Lecture Notes in Computer Science
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. ...
We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. ...
of the ad-hoc network. ...
doi:10.1007/978-3-540-39871-4_6
fatcat:sob2g5ymgzht5kia5axjdwmx6a
Making space for values
2013
Proceedings of the 6th International Conference on Communities and Technologies - C&T '13
This project explores whether the virtual nature of the NDN project impacts the emergence of values levers. ...
We then discuss the links between social values and communication practices in the values in design and virtual teams literatures. ...
ACKNOWLEDGMENTS Many thanks to Jeff Burke and Amalia Levy for discussions which have shaped this work, and feedback on drafts of this paper. ...
doi:10.1145/2482991.2482993
dblp:conf/candt/ShiltonK13
fatcat:2i5pfx4gpnc5tcqv7wlhkiaaz4
Challenges in disaster relief operations: evidence from the 2017 Kermanshah earthquake
2020
Journal of Humanitarian Logistics and Supply Chain Management
It also elaborates on the critical non-logistical challenges that influence aid delivery in emergency responses, including the growth of social media, regulations and the engagement of new HAs. ...
One group of challenges relates to humanitarian logistics (HL) like needs assessment, procurement, warehousing, transportation and distribution, all widely discussed in the literature. ...
Shared warehouses had been implemented in coordination with religious teams and ad hoc groups that did not have security teams. ...
doi:10.1108/jhlscm-08-2019-0054
fatcat:l2q2w3ofoffmpjkizclhlnzpfe
Semantic Web Technologies for Terrorist Network Analysis
[chapter]
2006
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
But these ad hoc databases are often on paper, are only intelligible to their creators, and are not maintained in a formal manner. ...
discussant mentioned an event in 1993. ...
doi:10.1002/047178656x.ch6
fatcat:is563sqpundnjgtvgvn5rryloe
Signal detection as the first line of defence in tourism crisis management
2013
Tourism Management
practice and the challenges faced in each of these three stages. ...
With this framework as a basis, 16 corporate level executives of international tourism organizations were interviewed in order to explore the significance of signal detection in their crisis management ...
on crisis signal detection in general or in particular aspects of it such as detection network, reliability of 'ad hoc' detectors, attributes of 'core' detectors, etc. ...
doi:10.1016/j.tourman.2012.04.007
pmid:32287739
pmcid:PMC7115597
fatcat:6vivjktn6badbhojkmmd3ybjty
Quantum Key Management
[chapter]
2012
Applied Cryptography and Network Security
Outlook: Towards mobile and Ad-hoc QKD networks The question, regarding the possibility of mobile or ad-hoc quantum networking, is perhaps the most promising one, which if it can be answered positively ...
It is thus fair to assume that the connection may be temporarily unavailable and in possible misalignment for short periods of time, particularly in a mobile ad-hoc environment. ...
Applied Cryptography and Network Security Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation ...
doi:10.5772/35400
fatcat:uysnzziqwngjrjwa67mlvtsjpa
ISSUES IN DEVELOPING CONTEXT AWARE INFORMATION SYSTEMS FOR HEALTH-CARE
2012
Issues in Information Systems
This research critically examines applications of existing context aware systems, especially in health care, and discusses the issues involved in the development of such systems. ...
In spite of that, many challenges remain to bring these systems to the mainstream of computing applications. ...
The difficulty of smoothing workflow with traditional computer based systems lies in the fact that healthcare clinical work is characterized as being hectic, nomadic, collaborative, ad hoc and interrupted ...
doi:10.48009/2_iis_2012_232-237
fatcat:dne4wqdlwzh2lot6657kt2q2oa
Bridging Broadcast Encryption and Group Key Agreement
[chapter]
2011
Lecture Notes in Computer Science
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but requires a trusted party to distribute decryption keys. ...
The aggregatability property is shown to be useful to construct advanced protocols. ...
(e.g., some ad hoc network applications). ...
doi:10.1007/978-3-642-25385-0_8
fatcat:vy5i2x6tdnbnnlm2hverdjlnxa
Service-oriented middleware for the Future Internet: state of the art and research directions
2011
Journal of Internet Services and Applications
Hachem INRIA, key research directions to be followed in light of the latest state of the art. ...
However, the evolution of the Internet, and in particular, the latest Future Internet vision, challenges the paradigm. ...
Marco Gerosa receives individual grant from CNPq and his work is also supported by HP, by means of the Baile Project. ...
doi:10.1007/s13174-011-0021-3
fatcat:smyeiarghbhapgfzuig2j4iavq
Towards a Framework for Strategic Security Context in Information Security Governance
2018
Pacific Asia Journal of the Association for Information Systems
Information security governance influences the quality of strategic decision-making to ensure that investments in security are effective. ...
These are (1) limited diversity in decision-making; (2) lack of guidance in corporate-level mission statements to security decision-makers; (3) a bottomup approach to security strategic context development ...
Security initiatives at MCL have been 'organically' grown and ad hoc. ...
doi:10.17705/1pais.10403
fatcat:5xmzpfancreg3phvahezfjc4uu
Vehicle Authentication via Monolithically Certified Public Key and Attributes
[article]
2015
arXiv
pre-print
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). ...
We illustrate the security verification of the proposed protocol using a detailed proof in Spi calculus. ...
In the scope of vehicle (ad-hoc) networks, secure interaction among the peer vehicles should be established rapidly without any third party assistance. ...
arXiv:1507.04491v1
fatcat:iusbs77tyjhjpedmemmu5xh4ui
The function of intermediaries in collaborative innovation processes: retrofitting a Danish small island ferry with green technology
2016
International Journal of Innovation and Sustainable Development
However, intermediaries can also have a proactive role in shaping the emerging innovation pathways. ...
They can provide functions to the incipient network as foresight, brokering, increasing network connectivity, and scanning of information. ...
The authors also acknowledge the staff of the Maritime Center for Operation and Development (MARCOD, Denmark) for their support with empirical materials and contacts during the preparation of the case ...
doi:10.1504/ijisd.2016.079581
fatcat:6jywavvrizgfviysci62triilq
The function of intermediaries in collaborative innovation processes: retrofitting a Danish small island ferry with green technology
2016
International Journal of Innovation and Sustainable Development
However, intermediaries can also have a proactive role in shaping the emerging innovation pathways. ...
They can provide functions to the incipient network as foresight, brokering, increasing network connectivity, and scanning of information. ...
The authors also acknowledge the staff of the Maritime Center for Operation and Development (MARCOD, Denmark) for their support with empirical materials and contacts during the preparation of the case ...
doi:10.1504/ijisd.2016.10000445
fatcat:ljdrf6hivfexvcpgyaez36r5ta
« Previous
Showing results 1 — 15 out of 10,258 results