Sciweavers

745 search results - page 56 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
NETWORKING
2008
14 years 11 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha
ICICS
2010
Springer
14 years 7 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
CONEXT
2009
ACM
14 years 11 months ago
Feasibility of content dissemination between devices in moving vehicles
We investigate the feasibility of content distribution between devices mounted in moving vehicles using commodity WiFi. We assume that each device stores content in a set of files...
Thomas Zahn, Greg O'Shea, Antony I. T. Rowstron
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
14 years 11 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
AINTEC
2006
Springer
15 years 1 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha