Sciweavers

1017 search results - page 90 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
Throughput-Oriented Power Control in MIMO-Based Ad Hoc Networks
— Transmission power control (TPC) has been used in wireless ad hoc networks to improve channel reuse and/or reduce energy consumption. It has been mainly applied to single-input...
Mohammad Z. Siam, Marwan Krunz
NETWORKING
2008
14 years 11 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...
WCNC
2008
IEEE
15 years 4 months ago
Estimation of Link Quality and Residual Time in Vehicular Ad Hoc Networks
—High node mobility and transient connectivity in Vehicular Ad Hoc NETworks have introduced numerous challenges in the design of efficient communication protocols for these netwo...
Nikoletta Sofra, Kin K. Leung
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 3 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...