Message processing methods and systems

T Dimitrakos, L Titkov, A Maierhofer - US Patent 8,856,862, 2014 - Google Patents
Methods and apparatus for controlling the operation of a distributed application using
message interception tech niques are disclosed. The message interception software is …

MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks

Y Harold Robinson, E Golden Julie - Wireless Personal Communications, 2019 - Springer
A mobile ad hoc network (MANET) is a collection of self-configured movable nodes. Keys
have to be securely handled and maintained and there are various techniques available in …

A localized certificate revocation scheme for mobile ad hoc networks

G Arboit, C Crépeau, CR Davis, M Maheswaran - Ad hoc networks, 2008 - Elsevier
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no
on-line access to trusted authorities, is a challenging problem. In wired network …

Computer network running a distributed application

T Dimitrakos, I Djordjevic, SK Nair - US Patent 8,713,636, 2014 - Google Patents
(57) ABSTRACT A computer network is disclosed in which a group of com puters co-operate
to perform a distributed application. In order to ensure that only members of that group of …

Efficient and robust key management for large mobile ad hoc networks

B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang - Computer networks, 2005 - Elsevier
Existing research efforts in key management can only handle very limited number of nodes
and are vulnerable to active attacks. In addition, the flexibility and adaptivity of handling …

Distributed computing network using multiple local virtual machines

T Dimitrakos, I Djordjevic, SK Nair - US Patent 8,595,480, 2013 - Google Patents
(57) ABSTRACT A distributed computer system is disclosed in which comput ers co-operate
with one another by sending messages over a network such as the Internet in order to …

Trust-based route selection in dynamic source routing

CD Jensen, PO Connell - International conference on trust management, 2006 - Springer
Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed
infrastructure. Nodes rely on each other to route packets to other mobile nodes or toward …

Understanding e-learning system usage outcomes in hybrid courses

AKMN Islam - 2012 45th Hawaii International Conference on …, 2012 - ieeexplore.ieee.org
E-learning systems are widely used in higher education. However, much of the research on
elearning systems focuses on the technology and is limited to the adoption and utilization e …

System and method for establishing a secure group of entities in a computer network

I Djordjrvic, T Dimitrakos - US Patent 8,756,423, 2014 - Google Patents
This invention relates to a system and method forestablishing a secure group of entities in a
computer network, Such as those originating from different trust domains, for the purpose of …

An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network

SS Wang, KQ Yan, SC Wang - Computers & electrical engineering, 2010 - Elsevier
Mobile ad hoc NETworks (MANETs) are becoming more popular due to the advantage that
they do not require any fixed infrastructure, and that communication among processors can …