Sciweavers

1017 search results - page 71 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
ADHOCNOW
2006
Springer
15 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
MIS
2007
Springer
163views Multimedia» more  MIS 2007»
14 years 9 months ago
Cooperative caching in mobile ad hoc networks based on data utility
Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ...
Narottam Chand, Ramesh C. Joshi, Manoj Misra
WWW
2003
ACM
15 years 10 months ago
A Caching Mechanism for Improving Internet based Mobile Ad Hoc Networks Performance
Internet based mobile ad hoc networks (IMANETs) have several limitations to fulfill users' demands to access various kinds of information such as limited accessibility to the...
Sunho Lim, Seung-Taek Park, Wang-Chien Lee, Guohon...
QSHINE
2005
IEEE
15 years 3 months ago
On Increasing End-to-End Throughput in Wireless Ad Hoc Networks
One of the main characteristics of wireless ad hoc networks is their node-centric broadcast nature of communication, leading to interferences and spatial contention between adjace...
Zongpeng Li, Baochun Li
TMC
2008
152views more  TMC 2008»
14 years 9 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...