Sciweavers

96 search results - page 7 / 20
» Ad Hoc Security Associations for Groups
Sort
View
135
Voted
CCS
2010
ACM
14 years 10 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
106
Voted
IAAI
2003
15 years 2 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
106
Voted
CSREASAM
2008
15 years 2 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
CORR
2010
Springer
218views Education» more  CORR 2010»
14 years 10 months ago
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANE...
Busola S. Olagbegi, Natarajan Meghanathan
111
Voted
IWCMC
2009
ACM
15 years 7 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...