Ad hoc procedure for optimising agreement between observational records

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment

Email: [email protected] Corresponding Author: Shu-Ching Wang Abstract. Since wireless communication and mobile computing are becoming more and more ubiquitous, the reliability and fault tolerance of the Mobile Ad-hoc Network (MANET) has become an important topic. In order to provide a reliable environment, a mechanism that allows a set of nodes to reach a common agreement, even in the pr...

متن کامل

A New Group Key Agreement Protocol for Ad Hoc Networks

A mobile ad hoc network is a collection of autonomous nodes that communicate with each other by forming a multi-top wireless network. Different from conventional wireless networks, the resource of the nodes in ad hoc networks is limited and there may be tens of thousands of low-power energy constrained nodes in ad hoc networks. As such, the costs of the nodes resource and the network size shoul...

متن کامل

EÆcient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks

|Secure and eÆcient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must be implemented. Due to the resource scarcity in wireless networks, the protocols must be communication eÆcient and need as less computational power as possible. To secure the group broadcasting in wireless net...

متن کامل

ID-Based Key Agreement with Anonymity for Ad Hoc Networks

Security support is a must for ad hoc networks. However, existing key agreement schemes for ad hoc networks ignore the issue of entity anonymity. Without anonymity, the adversary can easily identify and track specific entities in the communications. Not only entities’ movement information is valuable to the adversary but also the adversary can launch heavy attacks on those important nodes, base...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Anales de Psicología

سال: 2016

ISSN: 1695-2294,0212-9728

DOI: 10.6018/analesps.32.2.213551