Sciweavers

675 search results - page 132 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
103
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 3 months ago
A Delay-Bounded Dynamic Interactive Power Control Algorithm for VANETs
— To enable real-time and robust message delivery, the highly mobile Vehicular Ad Hoc Networks (VANETs) call for comprehensive investigation on the dynamic power control effects ...
Chunxiao Chigan, Jialiang Li
ICOIN
2004
Springer
15 years 2 months ago
A Routing Strategy for Metropolis Vehicular Communications
One of the major issues that affect the performance of mobile ad hoc networks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promising routin...
Genping Liu, Bu-Sung Lee, Boon-Chong Seet, Chuan H...
95
Voted
CCS
2003
ACM
15 years 2 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ACSAC
1998
IEEE
15 years 1 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu