Sciweavers

1686 search results - page 240 / 338
» Content-Based Routing in Mobile Ad Hoc Networks
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
SUTC
2006
IEEE
15 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
COORDINATION
2004
Springer
15 years 3 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman
AINA
2006
IEEE
15 years 1 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
IJHPCN
2006
114views more  IJHPCN 2006»
14 years 9 months ago
Improved schemes for power-efficient broadcast in ad hoc networks
: Ad hoc wireless networks are a special type of wireless network in which a collection of mobile hosts (nodes) with wireless network interfaces may form a temporary network withou...
Xiao Chen, Jian Shen