Sciweavers

1247 search results - page 59 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
ICWN
2004
14 years 11 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
SRDS
2005
IEEE
15 years 3 months ago
Consistency Management among Replicas in Peer-to-Peer Mobile Ad Hoc Networks
Recent advances in wireless communication along with Peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environ...
Takahiro Hara, Sanjay Kumar Madria
TPDS
2008
133views more  TPDS 2008»
14 years 9 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
ENTCS
2007
131views more  ENTCS 2007»
14 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
WONS
2005
IEEE
15 years 3 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...