Sciweavers

2572 search results - page 36 / 515
» Identification in Ad Hoc Networks
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
CN
2004
163views more  CN 2004»
14 years 11 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
SASN
2003
ACM
15 years 5 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 6 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
IJLT
2008
184views more  IJLT 2008»
14 years 11 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...