Sciweavers

702 search results - page 2 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
PET
2005
Springer
13 years 10 months ago
Privacy Issues in Vehicular Ad Hoc Networks
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
Florian Dötzer
IJNSEC
2008
160views more  IJNSEC 2008»
13 years 5 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
ADHOC
2006
155views more  ADHOC 2006»
13 years 5 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
WETICE
2002
IEEE
13 years 10 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
PDP
2006
IEEE
13 years 11 months ago
A Distributed Approach to Construction of Topology Mismatching Aware P2P Overlays in Wireless Ad Hoc Networks
Peer-to-Peer computing is mainly based on the virtual overlay network constructed in the application layer. Often, there is topology mismatching between the overlay network and th...
Yu Huang 0002, Beihong Jin, Jiannong Cao