Sciweavers

2691 search results - page 75 / 539
» Securing Ad Hoc Networks
Sort
View
ACISP
2006
Springer
15 years 10 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
PERCOM
2006
ACM
15 years 10 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
FSEN
2009
Springer
15 years 10 months ago
Equational Reasoning on Ad Hoc Networks
We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize...
Fatemeh Ghassemi, Wan Fokkink, Ali Movaghar
NOTERE
2010
15 years 2 months ago
Managing group membership in ad hoc m-commerce trading systems
Abstract—Managing group membership in an ad hoc mcommerce trading forum is a challenging task as peers may only have partial knowledge of the current membership due to frequent n...
Husna Osman, Hamish Taylor
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 6 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin