Sciweavers

832 search results - page 6 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
IEEEARES
2008
IEEE
15 years 3 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
MOBICOM
2003
ACM
15 years 2 months ago
Trajectory based forwarding and its applications
Trajectory based forwarding (TBF) is a novel method to forward packets in a dense ad hoc network that makes it possible to route a packet along a predefined curve. It is a genera...
Dragos Niculescu, Badri Nath
DFN
2004
14 years 10 months ago
Prototype Implementation of Anycast-based Service Discovery for Mobile Ad Hoc Networks
: Mobile ad hoc networks are self-organized, and devices in such networks have to locate available services dynamically. We propose to utilize anycast for efficient service discove...
Jidong Wu, Oliver Stanze, Kilian Weniger, Martina ...
116
Voted
ADHOCNOW
2004
Springer
15 years 2 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac