Sciweavers

1558 search results - page 235 / 312
» Mobility helps security in ad hoc networks
Sort
View
CCS
2006
ACM
15 years 3 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
PADS
2004
ACM
15 years 5 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
ITRUST
2004
Springer
15 years 5 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
ENTCS
2006
109views more  ENTCS 2006»
14 years 12 months ago
An Overview of MANETs Simulation
Mobile Ad hoc NETworks (MANETs) are dynamic networks populated by mobile stations. Stations in MANETs are usually laptops, PDAs or mobile phones. These devices feature Bluetooth a...
Luc Hogie, Pascal Bouvry, Frédéric G...
IJSN
2007
120views more  IJSN 2007»
14 years 11 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...