Sciweavers

547 search results - page 67 / 110
» Analysis of a mobile communication security protocol
Sort
View
SASN
2003
ACM
15 years 7 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
135
Voted
WICOMM
2008
258views more  WICOMM 2008»
15 years 1 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
MOBICOM
2000
ACM
15 years 6 months ago
An end-to-end approach to host mobility
We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Exi...
Alex C. Snoeren, Hari Balakrishnan
MOBIHOC
2008
ACM
16 years 1 months ago
The networking shape of vehicular mobility
Mobility is the distinguishing feature of vehicular networks, affecting the evolution of network connectivity over space and time in a unique way. Connectivity dynamics, in turn, ...
Marco Fiore, Jérôme Härri
124
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Evaluating Mobile Ad Hoc Networks: A Performance Index and Statistical Model
Abstract— This work is concerned with definining a performance index that can be used as an objective measure in the evaluation and comparison of ad hoc networking protocols. Sp...
Ikhlas Ajbar, Dmitri D. Perkins