Sciweavers

290 search results - page 6 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
ICOIN
2005
Springer
15 years 5 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
ICNP
2003
IEEE
15 years 4 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICIP
2008
IEEE
15 years 6 months ago
Temporal scalability and layered transmission
The deployment of mobile multimedia broadcast services like Mobile TV over cellular networks has just started. The coverage in terms of delivered quality per receiver is an import...
Cornelius Hellge, Thomas Schierl, Jörg Huschk...
DSN
2004
IEEE
15 years 3 months ago
Caching-Enhanced Scalable Reliable Multicast
We present the Caching-Enhanced Scalable Reliable Multicast (CESRM) protocol. CESRM augments the Scalable Reliable Multicast (SRM) protocol [4,5] with a caching-based expedited re...
Carolos Livadas, Idit Keidar
SENSYS
2004
ACM
15 years 5 months ago
Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks
Until practical ad-hoc localization systems are developed, early deployments of wireless sensor networks will manually configure location information in network nodes in order to...
Fang Bian, Ramesh Govindan, Scott Shenker, Xin Li