Sciweavers

182 search results - page 13 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
WS
2005
ACM
15 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 3 months ago
ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks
— The use of directional antennas in mobile ad hoc networks has shown to offer large potential throughput gains relative to omnidirectional antennas. When used in ad hoc networks...
Kun Liu, Walaa Hamouda, Amr Youssef
GLOBECOM
2006
IEEE
15 years 3 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
MOBICOM
1999
ACM
15 years 1 months ago
Analysis of TCP Performance over Mobile Ad Hoc Networks
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recent r...
Gavin Holland, Nitin H. Vaidya