Sciweavers

766 search results - page 138 / 154
» Securing Ad hoc Routing Protocols
Sort
View
TRUSTBUS
2005
Springer
15 years 4 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 5 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
PERVASIVE
2004
Springer
15 years 4 months ago
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Jun Rekimoto, Takashi Miyaki, Michimune Kohno
MOBIHOC
2006
ACM
15 years 10 months ago
Minimizing recovery state In geographic ad-hoc routing
Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use of recovery algorithms when the greedy approach...
Noa Arad, Yuval Shavitt
IWCMC
2006
ACM
15 years 5 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu