Sciweavers

359 search results - page 9 / 72
» Key Management for Heterogeneous Ad Hoc Wireless Networks
Sort
View
JMM
2006
57views more  JMM 2006»
14 years 9 months ago
Qos-Energy Aware Broadcast for Heterogeneous Wireless Ad Hoc Networks
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
117
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
90
Voted
IWCMC
2006
ACM
15 years 3 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 2 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
97
Voted
CIIT
2007
161views Communications» more  CIIT 2007»
14 years 11 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...