Sciweavers

1165 search results - page 191 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
118
Voted
IWCMC
2006
ACM
15 years 7 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
GLOBECOM
2006
IEEE
15 years 7 months ago
A Directional MAC Protocol for Practical Smart Antennas
- Recently, several MAC protocols using directional antennas, typically referred to as directional MAC protocols, have been proposed for wireless ad hoc networks. However, the MAC ...
Yuya Takatsuka, Katsushiro Nagashima, Masanori Tak...
COMCOM
2008
153views more  COMCOM 2008»
15 years 1 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
ICPPW
2003
IEEE
15 years 7 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
JNW
2008
117views more  JNW 2008»
15 years 1 months ago
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs
-Recently multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication. This includes application such as multipoint data disseminat...
E. Baburaj, V. Vasudevan