Sciweavers

1624 search results - page 46 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 2 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
AINA
2007
IEEE
15 years 2 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
NETWORK
2007
187views more  NETWORK 2007»
15 years 6 days ago
Cooperative and opportunistic transmission for wireless ad hoc networks
Moving toward 4G, wireless ad hoc networks receive growing interest due to users’ provisioning of mobility, usability of services, and seamless communications. In ad hoc network...
Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhis...
ADHOCNOW
2006
Springer
15 years 6 months ago
A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks
In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. On the other hand, unrealistic simulatio...
Emre Atsan, Öznur Özkasap
TRIDENTCOM
2005
IEEE
15 years 6 months ago
Wireless Nomadic Transfer over Mobile Ad hoc Networks
Mobile ad hoc networking allows the development of several infrastructure free applications. One of the arguments we focused on is the possibility of deploying a set of services i...
Stefano Annese, Andrea Ghittino