Sciweavers

1677 search results - page 69 / 336
» A distributed security scheme for ad hoc networks
Sort
View
JCM
2008
69views more  JCM 2008»
14 years 12 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
IWSEC
2007
Springer
15 years 6 months ago
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
Abstract. Advertisement dissemination is a promising M-commerce application which exploits the capabilities of mobile ad hoc networks to increase the visibility of the products bei...
Alexandre Viejo, Francesc Sebé, Josep Domin...
89
Voted
ICDCSW
2007
IEEE
15 years 6 months ago
Reception-Aware Routing for Energy Conservation in Ad Hoc Networks
Energy is a scarce resource in ad hoc mobile networks, making energy-aware communication crucial. In the absence of a central controlling entity and due to its dynamic network top...
Nirisha Shrestha
AINA
2005
IEEE
15 years 5 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
IEEECIT
2010
IEEE
14 years 9 months ago
Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc Grid
Mobile ad-hoc Grid is one of the modern distributed systems that have been introduced until now. It combines traditional grid capabilities with ad-hoc network flexibilities. Servic...
Askari Parichehreh, Bahman Javadi, Mehdi Sarikhani...