Sciweavers

ACISP
2006
Springer
13 years 11 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
WIOPT
2006
IEEE
13 years 11 months ago
Cooperative and reliable packet-forwarding on top of AODV
— Cooperative and reliable packet forwarding presents a formidable challenge in mobile ad hoc networks (MANET), due to special network characteristics; e.g., mobility, dynamic to...
Tal Anker, Danny Dolev, Bracha Hod
VTC
2006
IEEE
13 years 11 months ago
On Link Reliability in Wireless Mobile Ad Hoc Networks
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Juki Wirawan Tantra, Chuan Heng Foh, Dongyu Qiu
SUTC
2006
IEEE
13 years 11 months ago
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang
PERCOM
2006
ACM
13 years 11 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
PDP
2006
IEEE
13 years 11 months ago
A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) raise new challenges in designing protocols for solving the consensus problem. Among the others, how to design message efficient protocols so as to...
Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal
IPPS
2006
IEEE
13 years 11 months ago
Comparative study of price-based resource allocation algorithms for ad hoc networks
As mobile ad hoc networks provide a wide range of possibly critical services, providing quality of service guarantees becomes an essential element. Yet there is a limited understa...
Marcel Lüthi, Simin Nadjm-Tehrani, Calin Cure...
IPPS
2006
IEEE
13 years 11 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
INFOCOM
2006
IEEE
13 years 11 months ago
Efficient Flooding Scheme Based on 1-Hop Information in Mobile Ad Hoc Networks
—Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of message...
Hai Liu, Peng-Jun Wan, Xiaohua Jia, Xinxin Liu, F....
INFOCOM
2006
IEEE
13 years 11 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras