Sciweavers

SAINT
2003
IEEE
15 years 6 months ago
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detectio...
Paul Brutch, Calvin Ko
SAINT
2003
IEEE
15 years 6 months ago
Mobile Agent based realization of a distance evaluation system
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Vikram Jamwal, Sridhar Iyer
SAINT
2003
IEEE
15 years 6 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
SAINT
2003
IEEE
15 years 6 months ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas
SAINT
2003
IEEE
15 years 6 months ago
Applying Kerberos to the Communication Environment for Information Appliances
Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiros...
Internet Technology
Top of PageReset Settings