Sciweavers

576 search results - page 76 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
JISE
2007
98views more  JISE 2007»
14 years 11 months ago
Integrated Buffer and Route Management in a DTN with Message Ferry
Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivi...
Mooi Choo Chuah, Wenbin Ma
ADHOC
2007
104views more  ADHOC 2007»
14 years 12 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
SPW
2000
Springer
15 years 3 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 12 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
CNSM
2010
14 years 9 months ago
MANET network management and performance monitoring for NHDP and OLSRv2
Abstract--Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely "un-managed" network deployments, capable of accommodating highly dyn...
Ulrich Herberg, Thomas Clausen, Robert Cole