Sciweavers

1677 search results - page 224 / 336
» A distributed security scheme for ad hoc networks
Sort
View
AINA
2006
IEEE
15 years 4 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
IPPS
2002
IEEE
15 years 3 months ago
Dominating Set Based Bluetooth Scatternet Formation with Localized Maintenance
This paper addresses the problem of scatternet formation and maintenance for multi-hop Bluetooth based personal area and ad hoc networks with minimal communication overhead. Each ...
Ivan Stojmenovic
MSWIM
2004
ACM
15 years 3 months ago
Quantile models for the threshold range for k-connectivity
This study addresses the problem of k-connectivity of a wireless multihop network consisting of randomly placed nodes with a common transmission range, by utilizing empirical regr...
Henri Koskinen
CORR
2010
Springer
282views Education» more  CORR 2010»
14 years 8 months ago
A New Approach in Packet Scheduling in the Vanet
Vehicular Ad hoc Networks (VANET) are expected to have great potential to improve both traffic safety and comfort in the future. When many vehicles want to access data through roa...
Sayadi Mohammad Javad, Fathy Mahmood
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 4 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang