Sciweavers

278 search results - page 1 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
ICWN
2003
13 years 6 months ago
Ad Hoc Network Authentication: A Jini-Based Approach
D. M. Needham, M. M. McMahon, J. B. Datko
ISCAPDCS
2003
13 years 6 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
ICWN
2009
13 years 2 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
13 years 11 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
IJNSEC
2011
77views more  IJNSEC 2011»
12 years 11 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...