Sciweavers

2691 search results - page 105 / 539
» Securing Ad Hoc Networks
Sort
View
WIOPT
2006
IEEE
15 years 10 months ago
Link modeling with joint fading and distance uncertainty
— We introduce and discuss a novel link model that incorporates both uncertainty in the fading coefficients and the node distances for ad hoc networks with randomly placed nodes...
Martin Haenggi
ESORICS
2000
Springer
15 years 8 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
GLOBECOM
2006
IEEE
15 years 10 months ago
Topology Control for Simple Mobile Networks
— Topology control is the problem of assigning power levels to the nodes of an ad hoc network so as to create a specified network topology while minimizing the energy consumptio...
Liang Zhao, Errol L. Lloyd, S. S. Ravi
CIIT
2004
141views Communications» more  CIIT 2004»
15 years 5 months ago
Dilemma of using high datarate in IEEE 802.11B based multihop ad hoc networks
Due to the fact that high datarate has shorter transmission range, the benefit of using high datarate may be degraded for IEEE 802.11 based multihop ad hoc networks. In this paper...
Frank Yong Li, Andreas Hafslund, Mariann Hauge, Pa...
TPDS
2008
231views more  TPDS 2008»
15 years 4 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino