Sciweavers

182 search results - page 16 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
89
Voted
MSWIM
2005
ACM
15 years 6 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins
INFOCOM
2011
IEEE
14 years 3 months ago
Content management in a mobile ad hoc network: Beyond opportunistic strategy
Abstract—We study the challenging problem of strategic content placement in a dynamic MANET. Existing content placement techniques cannot cope with such network dynamics since th...
Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Son...
121
Voted
JNW
2006
149views more  JNW 2006»
15 years 9 days ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
116
Voted
MOBIHOC
2002
ACM
15 years 12 months ago
Path set selection in mobile ad hoc networks
Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on the network ability to support QoS...
Emin Gün Sirer, Panagiotis Papadimitratos, Zy...
CN
2008
106views more  CN 2008»
15 years 14 days ago
Efficient virtual-backbone routing in mobile ad hoc networks
Since the physical topology of Mobile Ad hoc Networks (MANETs) is generally unstable, an appealing approach is the construction of a stable and robust virtual topology or backbone...
Jamal N. Al-Karaki, Ahmed E. Kamal