Sciweavers

675 search results - page 35 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ASIACRYPT
2004
Springer
15 years 5 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
140
Voted
CORR
2010
Springer
432views Education» more  CORR 2010»
14 years 12 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
SAINT
2003
IEEE
15 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
IFIP8
2004
15 years 1 months ago
Ad hoc Service Grid - A Self-Organizing Infrastructure for Mobile Commerce
: The provisioning of location-specific services in medium-sized facilities like shopping malls, hospitals, and trade fares using WLAN access points or cellular phone systems has s...
Klaus Herrmann, Kurt Geihs, Gero Mühl
CEC
2007
IEEE
15 years 3 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...