Sciweavers

182 search results - page 1 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
AINA
2005
IEEE
13 years 10 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
VLDB
2008
ACM
133views Database» more  VLDB 2008»
14 years 5 months ago
A survey of data replication techniques for mobile ad hoc network databases
Prasanna Padmanabhan, Le Gruenwald, Anita Vallur, ...
MOBIHOC
2003
ACM
14 years 4 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
CSFW
2010
IEEE
13 years 8 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ISPAN
1999
IEEE
13 years 9 months ago
Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks
Much progress has been made toward solving the problem of routing packets inside an ad hoc network, but there are presently no complete proposals for connecting ad hoc networks to...
Josh Broch, David A. Maltz, David B. Johnson