Sciweavers

537 search results - page 64 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ADHOCNOW
2005
Springer
15 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ICT
2004
Springer
120views Communications» more  ICT 2004»
15 years 3 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
CCS
2008
ACM
14 years 12 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
IJSNET
2008
118views more  IJSNET 2008»
14 years 10 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...
JECR
2000
114views more  JECR 2000»
14 years 9 months ago
Intelligent Agents Acting as Artificial Employees in an Electronic Market
This paper describes an agent-based electronic market system whose underlying communication and cooperation protocols establish an artificial environment with advanced features. U...
Nikos I. Karacapilidis, Pavlos Moraitis