Sciweavers

459 search results - page 31 / 92
» A Reputation-Based Trust Mechanism for Ad Hoc Networks
Sort
View
97
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
IFIP8
2004
14 years 11 months ago
Ad hoc Service Grid - A Self-Organizing Infrastructure for Mobile Commerce
: The provisioning of location-specific services in medium-sized facilities like shopping malls, hospitals, and trade fares using WLAN access points or cellular phone systems has s...
Klaus Herrmann, Kurt Geihs, Gero Mühl
WCNC
2008
IEEE
15 years 4 months ago
RTRD: Real-Time and Reliable Data Delivery in Ad Hoc Networks
—In this paper, we present a reliable real-time data delivery (communication) mechanism for ad-hoc networks, called RTRD. The mechanism makes use of a proactive wireless routing ...
Kai Han, Guanhong Pei, Binoy Ravindran, Hyeonjoong...
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena