Sciweavers

345 search results - page 3 / 69
» A Distributed Light-Weight Authentication Model for Ad-hoc N...
Sort
View
MSWIM
2005
ACM
13 years 10 months ago
Authentication protocols for ad hoc networks: taxonomy and research issues
Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweis...
ICASSP
2011
IEEE
12 years 9 months ago
Impulsive interference mitigation in ad hoc networks based on alpha-stable modeling and particle filtering
In this paper, we tackle the problem of interference mitigation in ad hoc networks. In such context, the multiple access interference (MAI) is known to be of an impulsive nature. ...
Nouha Jaoua, Emmanuel Duflos, Philippe Vanheeghe, ...
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 5 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
WS
2003
ACM
13 years 10 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
SAINT
2003
IEEE
13 years 10 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta