Sciweavers

1862 search results - page 361 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
INFOCOM
2002
IEEE
15 years 4 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
NBIS
2009
Springer
15 years 5 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
LADC
2007
Springer
15 years 5 months ago
Gossiping: Adaptive and Reliable Broadcasting in MANETs
Given the frequent topology changes in Mobile Ad Hoc Networks (MANET), the choice of appropriate broadcasting techniques is crucial to ensure reliable delivery of messages. The spr...
Abdelmajid Khelil, Neeraj Suri
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
15 years 4 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
CONEXT
2009
ACM
15 years 11 days ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...