Sciweavers

1247 search results - page 70 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
GLOBECOM
2010
IEEE
14 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang
ICCNMC
2005
Springer
15 years 3 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
15 years 3 months ago
Reliable Broadcast in Wireless Mobile Ad Hoc Networks
— We propose a single source reliable broadcasting algorithm for linear grid-based networks where a message is guaranteed to be delivered to all the nodes of the network. The nod...
Mansoor Mohsin, David Cavin, Yoav Sasson, Ravi Pra...
SNPD
2007
14 years 11 months ago
Secure Routing for Mobile Ad Hoc Networks
Jing Liu, Fei Fu, Junmo Xiao, Yang Lu