Sciweavers

369 search results - page 8 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
WISTP
2010
Springer
14 years 11 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
APNOMS
2009
Springer
15 years 8 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim
122
Voted
WS
2004
ACM
15 years 7 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
GLOBECOM
2007
IEEE
15 years 2 months ago
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
—In the context of mobile ad hoc networks (MANETs) routing, we propose a clustering algorithm called Connectivity, Energy and Mobility driven Clustering Algorithm (CEMCA). The ai...
Fatiha Djemili Tolba, Damien Magoni, Pascal Lorenz
127
Voted
JSAC
2006
114views more  JSAC 2006»
15 years 1 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu