Sciweavers

2691 search results - page 73 / 539
» Securing Ad Hoc Networks
Sort
View
124
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
ICPPW
2003
IEEE
15 years 9 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
TRIDENTCOM
2005
IEEE
15 years 9 months ago
Wireless Nomadic Transfer over Mobile Ad hoc Networks
Mobile ad hoc networking allows the development of several infrastructure free applications. One of the arguments we focused on is the possibility of deploying a set of services i...
Stefano Annese, Andrea Ghittino
GI
2004
Springer
15 years 9 months ago
Providing Service Continuity in Ad Hoc Networks
: Most of the investigations on ad hoc protocols do not consider the fact that future wireless networks are capable to adapt their behaviour to the channel situation. These adaptin...
Erik Weiss, Bangnan Xu, Sven Hischke
153
Voted
IWDC
2005
Springer
139views Communications» more  IWDC 2005»
15 years 9 months ago
A New Routing Protocol in Ad Hoc Networks with Unidirectional Links
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc network, it is not ne...
Deepesh Man Shrestha, Young-Bae Ko