Sciweavers

2691 search results - page 40 / 539
» Security in Ad Hoc Networks
Sort
View
AINA
2007
IEEE
15 years 3 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
15 years 3 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
NDSS
2002
IEEE
15 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
92
Voted
ITCC
2005
IEEE
15 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
GI
2004
Springer
15 years 2 months ago
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
: Ad hoc networking with Bluetooth requires an efficient way of discovering neighbor devices. Based on real-world measurements and simulations we are deriving optimal parameters f...
Diego Bohman, Matthias Frank, Peter Martini, Chris...