Sciweavers

182 search results - page 4 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
44
Voted
JIPS
2011
69views more  JIPS 2011»
14 years 10 days ago
Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
HyoJin Kim, Ramachandra Bhargav Chitti, JooSeok So...
81
Voted
IJACI
2010
164views more  IJACI 2010»
14 years 8 months ago
Exploring Multi-Path Communication in Hybrid Mobile Ad Hoc Networks
Abstract. Ambient computing requires the integration of multiple mobile heterogeneous networks. Multi-path communication, in such scenarios, can provide reliability and privacy ben...
Roberto Speicys Cardoso, Mauro Caporuscio
TPDS
2008
231views more  TPDS 2008»
14 years 9 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
78
Voted
PEWASUN
2004
ACM
15 years 2 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...