Sciweavers

1558 search results - page 243 / 312
» Mobility helps security in ad hoc networks
Sort
View
ADHOC
2007
73views more  ADHOC 2007»
15 years 23 hour ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve
SISW
2005
IEEE
15 years 5 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
SAC
2005
ACM
15 years 5 months ago
Dynamic group communication in mobile peer-to-peer environments
This paper presents an approach to integrate publish/subscribe semantics with on-demand multicast in wireless ad hoc networks, providing dynamic group communication with fine-gra...
Eiko Yoneki, Jean Bacon
WS
2004
ACM
15 years 5 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
INTERSENSE
2006
ACM
15 years 5 months ago
Particle-based methodology for representing mobile ad-hoc networks
—We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism wit...
Carlos J. Martinez, Marisa López, Luis C. E...