Sciweavers

1862 search results - page 289 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
107
Voted
ESAS
2007
Springer
15 years 7 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
110
Voted
WMASH
2004
ACM
15 years 6 months ago
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a multibillion dollars market. Yet many consumers consider that the price cellular netwo...
Márk Félegyházi, Srdjan Capku...
IPCCC
2005
IEEE
15 years 6 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
122
Voted
WONS
2005
IEEE
15 years 6 months ago
Multipath Associativity Based Routing
Abstract:This paper introduces a series of new multipath routing protocols developed upon Associativity Based Routing (ABR) for wireless ad-hoc networks. ABR selects routes based o...
Patrick McCarthy, Dan Grigoras
113
Voted
USENIX
1994
15 years 2 months ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...