Sciweavers

1677 search results - page 229 / 336
» A distributed security scheme for ad hoc networks
Sort
View
105
Voted
COLCOM
2007
IEEE
15 years 4 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
SASN
2006
ACM
15 years 4 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
GLOBECOM
2006
IEEE
15 years 4 months ago
A Directional MAC Protocol for Practical Smart Antennas
- Recently, several MAC protocols using directional antennas, typically referred to as directional MAC protocols, have been proposed for wireless ad hoc networks. However, the MAC ...
Yuya Takatsuka, Katsushiro Nagashima, Masanori Tak...
MWCN
2004
Springer
15 years 3 months ago
Context-Aware Inter-Networking for Wireless Networks
Abstract Key issues of wireless ad hoc networks are auto-configuration and flexibility. Due to mobility, wireless networks are subject to frequent splits and merges. In many situ...
Franck Legendre, Marcelo Dias de Amorim, Serge Fdi...
MOBIHOC
2003
ACM
15 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong