Sciweavers

1624 search results - page 52 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
126
Voted
IJNSEC
2008
152views more  IJNSEC 2008»
15 years 22 days ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
81
Voted
IFIP
2003
Springer
15 years 6 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
96
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking
Zero Configuration Networking (Zeroconf) assigns IP addresses and host names, and discovers service without a central server. Zeroconf can be used in wireless mobile ad-hoc network...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
99
Voted
BROADNETS
2004
IEEE
15 years 4 months ago
Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
We consider the throughput/delay tradeoffs for scheduling data transmissions in a mobile ad hoc network. To reduce delays in the network, each user sends redundant packets along mu...
Michael J. Neely, Eytan Modiano
107
Voted
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 6 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo