133
click to vote
SASN
15 years 6 months ago
2003 ACM
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
134
click to vote
SASN
15 years 6 months ago
2003 ACM
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
138
click to vote
SASN
15 years 6 months ago
2003 ACM
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
109
click to vote
SASN
15 years 6 months ago
2003 ACM
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
122
click to vote
SASN
15 years 6 months ago
2003 ACM
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
|