Sciweavers

1990 search results - page 353 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
WISA
2009
Springer
15 years 6 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
CSREASAM
2006
15 years 1 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
ICDCSW
2006
IEEE
15 years 5 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora
APCSAC
2003
IEEE
15 years 5 months ago
A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
ADHOC
2007
104views more  ADHOC 2007»
14 years 12 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong