Sciweavers

1624 search results - page 26 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
112
Voted
ICWN
2009
14 years 10 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
130
Voted
KES
2004
Springer
15 years 6 months ago
Supporting Smart Applications in Multihop Ad-Hoc Networks - The GecGo Middleware
The goal of the GecGo middleware is to provide all the services required by self-organizing distributed applications running on multihop ad-hoc networks. Because of the frequent as...
Peter Sturm, Hannes Frey, Daniel Görgen, Joha...
117
Voted
ADHOC
2008
146views more  ADHOC 2008»
15 years 24 days ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
ICSE
2001
IEEE-ACM
15 years 5 months ago
Consistent Group Membership in Ad Hoc Networks
The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important beca...
Gruia-Catalin Roman, Qingfeng Huang, Ali Hazemi
AP2PC
2003
Springer
15 years 5 months ago
Mobile Agents for Locating Documents in Ad Hoc Networks
The wide availability of mobile devices equipped with wireless communication capabilities together with the technical possibility to form adhoc networks paves the way for building ...
Khaled Nagi, Iman Elghandour, Birgitta König-...