Sciweavers

1390 search results - page 24 / 278
» Geometric Spanners for Wireless Ad Hoc Networks
Sort
View
168
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 8 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TIT
2002
148views more  TIT 2002»
15 years 1 months ago
The use of multiuser detectors for multicasting in wireless ad hoc CDMA networks
In this paper, we address the issue of performance of linear multiuser detectors for a multicasting application in an ad hoc wireless network. Using a code-division multiple-access...
Chandrasekar Sankaran, Anthony Ephremides
CISSE
2008
Springer
15 years 3 months ago
Modeling Trust in Wireless Ad-Hoc Networks
Tirthankar Ghosh, Hui Xu
85
Voted
ICWMC
2006
IEEE
15 years 8 months ago
Localized Tree Change Multicast Protocol for Mobile Ad Hoc Networks
T. Srinivasan, Chandrasekar Ramachandran, Vivek Vi...
WONS
2005
IEEE
15 years 7 months ago
Experiments of Some Performance Issues with IEEE 802.11b in Ad Hoc Networks
Claude Chaudet, Dominique Dhoutaut, Isabelle Gu&ea...