Sciweavers

2691 search results - page 59 / 539
» Security in Ad Hoc Networks
Sort
View
EWSN
2004
Springer
16 years 1 months ago
Matrix Pencil for Positioning in Wireless ad hoc Sensor Network
Liang Song, Raviraj Adve, Dimitrios Hatzinakos
127
Voted
ANTSW
2008
Springer
15 years 3 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
154
Voted
ESAS
2004
Springer
15 years 7 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
117
Voted
ICCS
2007
Springer
15 years 8 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong