Sciweavers

313 search results - page 27 / 63
» Key agreement in ad hoc networks
Sort
View
TIFS
2010
130views more  TIFS 2010»
14 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
76
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Hierarchical Cooperation Achieves Linear Capacity Scaling in Ad Hoc Networks
— n source and destination pairs randomly located in a fixed area want to communicate with each other. It is well known that classical multihop architectures that decode and for...
Ayfer Özgür, Olivier Lévêqu...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
14 years 9 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
JNW
2007
87views more  JNW 2007»
14 years 9 months ago
Modeling of IEEE 802.11 DCF for Transient State Conditions
—Performance of IEEE 802.11 distributed coordination function (DCF) has been studied by several authors under steady-state conditions. Behavior of DCF under transient state condi...
Rama Krishna Challa, Saswat Chakrabarti, Debasish ...
PERCOM
2009
ACM
15 years 10 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi