Sciweavers

1267 search results - page 190 / 254
» On the scalability of IEEE 802.11 ad hoc networks
Sort
View
GLOBECOM
2007
IEEE
15 years 7 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ASIACRYPT
2004
Springer
15 years 6 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
ICC
2008
IEEE
122views Communications» more  ICC 2008»
15 years 7 months ago
Improving Quality of Experience by Adding Device Resource Reservation to Service Discovery Protocols
— Current service discovery protocols (SDP) hardly provide information on the actual availability of resources in the network or a mechanism for (device) resource reservation. Wh...
Archi Delphinanto, A. M. J. Koonen, Frank T. H. de...
ICDCS
2008
IEEE
15 years 7 months ago
On Cooperative Caching in Wireless P2P Networks
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these stu...
Jing Zhao, Ping Zhang, Guohong Cao
GLOBECOM
2008
IEEE
15 years 7 months ago
COMB: Cell Based Orientation Aware MANET Broadcast MAC Layer
—The design of a collision avoidance system for trains implies the design of a MAC layer for their specific requirements. It should be efficient, reliable, use broadcast and su...
Cristina Rico Garcia, Andreas Lehner, Thomas Stran...