Sciweavers

1862 search results - page 6 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
138
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 10 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
AINA
2007
IEEE
15 years 4 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
45
Voted
SNPD
2007
14 years 11 months ago
Secure Routing for Mobile Ad Hoc Networks
Jing Liu, Fei Fu, Junmo Xiao, Yang Lu
COMPUTER
2004
61views more  COMPUTER 2004»
14 years 10 months ago
Routing and Security in Mobile Ad Hoc Networks
Nikola Milanovic, Miroslaw Malek, Anthony Davidson...
98
Voted
ESAS
2007
Springer
15 years 4 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...