142
click to vote
SASN
15 years 7 months ago
2003 ACM
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
147
click to vote
SASN
15 years 7 months ago
2003 ACM
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
145
click to vote
SASN
15 years 7 months ago
2003 ACM
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
118
click to vote
SASN
15 years 7 months ago
2003 ACM
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
131
click to vote
SASN
15 years 7 months ago
2003 ACM
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
|