Sciweavers

766 search results - page 147 / 154
» Securing Ad hoc Routing Protocols
Sort
View
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 2 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 11 months ago
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
ADHOC
2005
119views more  ADHOC 2005»
14 years 11 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou
GLOBECOM
2009
IEEE
15 years 5 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
TIFS
2011
252views Education» more  TIFS 2011»
14 years 6 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...