Sciweavers

859 search results - page 11 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
INFOCOM
2005
IEEE
15 years 5 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
ISAAC
2009
Springer
140views Algorithms» more  ISAAC 2009»
15 years 6 months ago
Tighter Approximation Bounds for Minimum CDS in Wireless Ad Hoc Networks
Abstract. Connected dominating set (CDS) has a wide range of applications in wireless ad hoc networks. A number of approximation algorithms for constructing a small CDS in wireless...
Minming Li, Peng-Jun Wan, F. Frances Yao
WISEC
2009
ACM
15 years 6 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
JSAC
2007
128views more  JSAC 2007»
14 years 11 months ago
Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication
Abstract— Recent advances in wireless inter-vehicle communication systems enable the establishment of Vehicular Ad-hoc Networks (VANET) and create significant opportunities for ...
Marios D. Dikaiakos, Andreas Florides, Tamer Nadee...
ACSC
2004
IEEE
15 years 3 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald