Sciweavers

18 search results - page 2 / 4
» On a Construction of Short Digests for Authenticating Ad Hoc...
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 5 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
IMCSIT
2010
13 years 2 months ago
Fast Construction of Broadcast Scheduling and Gossiping in Dynamic Ad Hoc Networks
This paper studies the minimum latency broadcast schedule (MLBS) problem in ad hoc networks represented by unit disk graphs. In our approach we use an algorithm, which does not nee...
Krzysztof Krzywdzinski
IPPS
2007
IEEE
13 years 11 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
ESAS
2007
Springer
13 years 11 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
SAINT
2003
IEEE
13 years 10 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta