Sciweavers

278 search results - page 3 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
WS
2003
ACM
13 years 11 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
ADHOC
2006
128views more  ADHOC 2006»
13 years 6 months ago
A novel caching scheme for improving Internet-based mobile ad hoc networks performance
Internet-based mobile ad hoc network (IMANETIMANET) is an emerging technique that combines a wired network (e.g. Internet) and a mobile ad hoc network (MANETMANET) for developing ...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
JDCTA
2010
150views more  JDCTA 2010»
13 years 1 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 10 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ADHOC
2007
134views more  ADHOC 2007»
13 years 6 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu