Sciweavers

255 search results - page 7 / 51
» Non-interactive key establishment in mobile ad hoc networks
Sort
View
ICN
2009
Springer
15 years 2 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
85
Voted
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 3 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo
AWCC
2004
Springer
15 years 3 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
76
Voted
ICNP
2002
IEEE
15 years 2 months ago
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks
Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobilityinduced disconnection, reconnection, and high out-of-order delivery...
Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, S...