Sciweavers

1316 search results - page 33 / 264
» JMS on Mobile Ad Hoc Networks
Sort
View
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
86
Voted
TPDS
2008
231views more  TPDS 2008»
14 years 9 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
JNW
2008
116views more  JNW 2008»
14 years 8 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
GLOBECOM
2007
IEEE
14 years 9 months ago
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
—In the context of mobile ad hoc networks (MANETs) routing, we propose a clustering algorithm called Connectivity, Energy and Mobility driven Clustering Algorithm (CEMCA). The ai...
Fatiha Djemili Tolba, Damien Magoni, Pascal Lorenz
INFOCOM
2010
IEEE
14 years 8 months ago
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Delia Ciullo, Valentina Martina, Michele Garetto, ...