Sciweavers

1247 search results - page 189 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
ESAS
2007
Springer
15 years 4 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
SPW
1999
Springer
15 years 2 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
SAC
2004
ACM
15 years 3 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
IWEC
2004
14 years 11 months ago
Sound Pryer: Adding Value to Traffic Encounters with Streaming Audio
We present a novel in-car entertainment application that is inspired by listening to music and the social interaction of manoeuvring in traffic. The Sound Pryer is a peer-to-peer a...
Mattias Östergren