Sciweavers

832 search results - page 24 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
ADHOC
2007
91views more  ADHOC 2007»
14 years 9 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
NCA
2003
IEEE
15 years 2 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
92
Voted
WONS
2005
IEEE
15 years 3 months ago
Secure Multipath Routing for Mobile Ad Hoc Networks
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...
ENTCS
2006
173views more  ENTCS 2006»
14 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
CATA
2003
14 years 11 months ago
Efficient Power-aware Hybrid Routing using Zoning for Ad Hoc Network
A number of routing protocols have been proposed for mobile ad hoc networks. In this paper we propose a hybrid multiple zoning scheme minimizing the number of route request messag...
Jong Ho Lee, Hee Yong Youn, Chansu Yu, Dongman Lee