Sciweavers

655 search results - page 37 / 131
» Connectivity Service for Mobile Ad-Hoc Networks
Sort
View
SUTC
2006
IEEE
15 years 5 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICOIN
2005
Springer
15 years 5 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
GLOBECOM
2009
IEEE
15 years 6 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
AINA
2007
IEEE
15 years 6 months ago
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks
A Mobile Ad-hoc Network (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A numb...
Sudath Indrasinghe, Rubem Pereira, John Haggerty
MSWIM
2005
ACM
15 years 5 months ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk