Sciweavers

2691 search results - page 98 / 539
» Securing Ad Hoc Networks
Sort
View
PIMRC
2010
IEEE
15 years 2 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
FTDCS
2004
IEEE
15 years 8 months ago
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications
Peer-to-peer (P2P) networks and mobile ad hoc networks (MANET) share some key characteristics: selforganization and decentralization, and both need to solve the same fundamental p...
Lu Yan, Kaisa Sere, Xinrong Zhou, Jun Pang
GLOBECOM
2010
IEEE
15 years 2 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
CN
2008
118views more  CN 2008»
15 years 4 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso
ACSAC
2001
IEEE
15 years 8 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott