Sciweavers

702 search results - page 28 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
129
Voted
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
84
Voted
ESAS
2007
Springer
15 years 3 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
INFOCOM
2005
IEEE
15 years 3 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
LCN
2006
IEEE
15 years 3 months ago
Data Aggregation System for Distributing Inter-Vehicle Warning Messages
The use of ad hoc networking technology in the automotive environment enables new promising services, mainly providing information to the driver increasing vehicle safety. This wi...
Stephan Eichler, Christian Merkle, Markus Strassbe...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 4 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...