Sciweavers

2691 search results - page 134 / 539
» Securing Ad Hoc Networks
Sort
View
145
Voted
ICC
2008
IEEE
163views Communications» more  ICC 2008»
15 years 11 months ago
Network Coding Based Cooperative Peer-to-Peer Repair in Wireless Ad-Hoc Networks
— Cooperative Peer-to-Peer Repair (CPR) has been proposed to recover from packet losses incurred during 3G broadcast. CPR leverages the increasing presence of multi-homed mobile ...
Xin Liu, Saqib Raza, Chen-Nee Chuah, Gene Cheung
125
Voted
SECON
2007
IEEE
15 years 11 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
ASIACRYPT
2004
Springer
15 years 10 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 9 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
IWCMC
2009
ACM
15 years 11 months ago
On fault tolerant ad hoc network design
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Wasim El-Hajj, Hazem Hajj, Zouheir Trabelsi