Sciweavers

2691 search results - page 44 / 539
» Security in Ad Hoc Networks
Sort
View
ENTCS
2007
131views more  ENTCS 2007»
15 years 1 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
115
Voted
IJWIN
2006
119views more  IJWIN 2006»
15 years 1 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
114
Voted
ICWN
2003
15 years 3 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
110
Voted
COMSUR
2008
110views more  COMSUR 2008»
15 years 1 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...