Sciweavers

1862 search results - page 326 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
ANSS
2003
IEEE
15 years 6 months ago
An ns-based Bluetooth Topology Construction Simulation Environment
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
Chia-Jui Hsu, Yuh-Jzer Joung
84
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Maximizing Transport Capacity for Geographic Transmission on Nakagami-m Channels
—In mobile ad hoc networks (MANETs), conventional packet forwarding schemes that pre-select the next-hop receivers for a packet may fail if the channel coherence time is on the o...
Tathagata D. Goswami, John M. Shea, Tan F. Wong, M...
108
Voted
ECEASST
2008
112views more  ECEASST 2008»
15 years 21 days ago
Flexible Modeling of Emergency Scenarios using Reconfigurable Systems
In emergency scenarios we can obtain a more effective coordination among team members constituting a mobile ad hoc network (MANET) through the use of reconfigurable systems. This ...
Kathrin Hoffmann, Hartmut Ehrig, Julia Padberg
109
Voted
ACSC
2004
IEEE
15 years 4 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
99
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 2 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet