Sciweavers

1862 search results - page 279 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
136
Voted
MOBIQUITOUS
2007
IEEE
15 years 7 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
99
Voted
IJNSEC
2006
156views more  IJNSEC 2006»
15 years 23 days ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
97
Voted
WAC
2005
Springer
122views Communications» more  WAC 2005»
15 years 6 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
107
Voted
BROADNETS
2004
IEEE
15 years 4 months ago
Science of Continuous Media Application Design in Wireless Networks of Mobile Devices
Display of continuous media using self-organizing ad hoc networks of wireless communication systems will potentially be used in a variety of applications. Example deployments migh...
Shahram Ghandeharizadeh
119
Voted
MOBIHOC
2008
ACM
16 years 11 days ago
The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception
We address the cost incurred in increasing the transport capacity of wireless ad hoc networks over what can be attained when sources and destinations communicate over multi-hop pa...
Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garc...