Sciweavers

112 search results - page 16 / 23
» Secure long term communities in ad hoc networks
Sort
View
131
Voted
TPDS
2008
133views more  TPDS 2008»
15 years 1 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
134
Voted
IWCMC
2006
ACM
15 years 7 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
GLOBECOM
2006
IEEE
15 years 8 months ago
Position-based Routing using Virtual Small World in MANETs
— Routing is the foremost issue in mobile ad hoc networks (MANETs), In a wireless environment characterized by small bandwidth and limited computation resources, positionbased ro...
Cong Liu, Jie Wu
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 3 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
SASN
2003
ACM
15 years 7 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...