Sciweavers

1677 search results - page 56 / 336
» A distributed security scheme for ad hoc networks
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 1 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
IJNSEC
2006
205views more  IJNSEC 2006»
14 years 12 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
CN
2006
166views more  CN 2006»
14 years 12 months ago
GLR: A novel geographic routing scheme for large wireless ad hoc networks
Wireless ad hoc routing has been extensively studied and many clever schemes have been proposed over the last several years. One class of ad hoc routing is geographic routing wher...
Jongkeun Na, Chong-kwon Kim
ICNS
2009
IEEE
15 years 6 months ago
Security Solution for Mobile Ad Hoc Network of Networks (MANoN)
Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau
ICWN
2009
14 years 9 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...