When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Conventional routing algorithms in mobile ad hoc networks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalabl...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...