Sciweavers

1558 search results - page 43 / 312
» Mobility helps security in ad hoc networks
Sort
View
75
Voted
PERCOM
2006
ACM
15 years 11 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
MOBIHOC
2005
ACM
15 years 11 months ago
Towards commercial mobile ad hoc network applications: a radio dispatch system
Elgan Huang, Wenjun Hu, Jon Crowcroft, Ian J. Wass...
IWCMC
2006
ACM
15 years 5 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
ENTCS
2007
96views more  ENTCS 2007»
14 years 11 months ago
An Observational Theory for Mobile Ad Hoc Networks
We propose a process calculus to study the behavioural theory of Mobile Ad Hoc Networks. The operational semantics of our calculus is given both in terms of a Reduction Semantics ...
Massimo Merro