Sciweavers

1558 search results - page 21 / 312
» Mobility helps security in ad hoc networks
Sort
View
TIFS
2010
130views more  TIFS 2010»
14 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
ADHOCNOW
2007
Springer
15 years 4 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
INFOCOM
2010
IEEE
14 years 8 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
ICDCSW
2006
IEEE
15 years 3 months ago
CoCoA: Coordinated Cooperative Localization for Mobile Multi-Robot Ad Hoc Networks
Mobile robot teams are particularly suited to applications where infrastructure is unavailable or damaged since they can be used to quickly form an infrastructure-less mobile ad h...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
ISORC
2006
IEEE
15 years 3 months ago
QoS Support for Mobile Ad-Hoc Networks Based on a Reservation Pool
Many interesting applications using mobile ad-hoc networks are possible if quality-of-service (QoS) can be effectively supported. Towards that end, this paper proposes a method ba...
Min-Gu Lee, Sunggu Lee