Sciweavers

1165 search results - page 49 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 6 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
68
Voted
INFOCOM
2009
IEEE
15 years 6 months ago
An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
ICT
2004
Springer
123views Communications» more  ICT 2004»
15 years 5 months ago
PRDS: A Priority Based Route Discovery Strategy for Mobile Ad Hoc Networks
Bosheng Zhou, Alan Marshall, Jieyi Wu, Tsung-Han L...
INFOCOM
2012
IEEE
13 years 2 months ago
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks
Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdon...