Sciweavers

1017 search results - page 128 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
DPD
2007
100views more  DPD 2007»
14 years 9 months ago
Managing real-time database transactions in mobile ad-hoc networks
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastr...
Le Gruenwald, Shankar M. Banik, Chuo N. Lau
JSAC
2007
224views more  JSAC 2007»
14 years 9 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
TON
2008
109views more  TON 2008»
14 years 9 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
MONET
2002
142views more  MONET 2002»
14 years 9 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...