Sciweavers

29 search results - page 2 / 6
» Enforcing Data Integrity in Very Large Ad Hoc Networks
Sort
View
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 4 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta
IJAHUC
2010
130views more  IJAHUC 2010»
13 years 3 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
FGCN
2008
IEEE
155views Communications» more  FGCN 2008»
13 years 11 months ago
A Reliable Robust Fully Ad Hoc Data Dissemination Mechanism for Vehicular Networks
Many applications in vehicular networks need the data to be disseminated from a source vehicle to a large number of vehicles in the network. Although many solutions to this proble...
Kaveh Shafiee, Victor C. M. Leung
ADHOCNOW
2008
Springer
13 years 11 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...
GCC
2004
Springer
13 years 10 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...