Sciweavers

57 search results - page 12 / 12
» Fully self-organized peer-to-peer key management for mobile ...
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 5 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
EJWCN
2010
115views more  EJWCN 2010»
12 years 11 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...