Sciweavers

1165 search results - page 160 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
WWIC
2004
Springer
143views Communications» more  WWIC 2004»
15 years 7 months ago
CGGC: Cached Greedy Geocast
Abstract. With cached greedy geocast, we propose an enhanced forwarding scheme for geocast especially in highly mobile ad hoc networks. We will show, that a cache for presently unf...
Christian Maihöfer, Reinhold Eberhardt, Elmar...
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
131
Voted
MSWIM
2009
ACM
15 years 6 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
MOBICOM
2003
ACM
15 years 7 months ago
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Significant TCP unfairness in ad hoc wireless networks has been reported during the past several years. This unfairness results from the nature of the shared wireless medium and ...
Kaixin Xu, Mario Gerla, Lantao Qi, Yantai Shu
LCN
2008
IEEE
15 years 8 months ago
Understanding and using mobility on Publish/Subscribe based architectures for MANETs
Abstract—Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the...
Cristiano G. Rezende, Azzedine Boukerche, Bruno P....