Sciweavers

459 search results - page 28 / 92
» A Reputation-Based Trust Mechanism for Ad Hoc Networks
Sort
View
CCS
2010
ACM
14 years 7 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
LCN
2006
IEEE
15 years 3 months ago
Achieving Fairness in IEEE 802.11 Ad Hoc Networks
IEEE 802.11 has become the main technology in local area wireless networks. However, performance anomalies, especially, in terms of fairness, arise in its use in ad hoc networks. ...
Fanilo Harivelo, Pascal Anelli
AINTEC
2006
Springer
15 years 1 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
CSCW
2002
ACM
14 years 9 months ago
Using speakeasy for ad hoc peer-to-peer collaboration
Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencie...
W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, ...
GLOBECOM
2010
IEEE
14 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate