Sciweavers

2691 search results - page 65 / 539
» Security in Ad Hoc Networks
Sort
View
ADHOC
2008
183views more  ADHOC 2008»
15 years 2 months ago
On ant routing algorithms in ad hoc networks with critical connectivity
This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing alg...
Laura Rosati, Matteo Berioli, Gianluca Reali
TON
2008
75views more  TON 2008»
15 years 1 months ago
An algorithmic approach to geographic routing in ad hoc and sensor networks
The one type of routing in ad hoc and sensor networks that currently appears to be most amenable to algorithmic analysis
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
WISTP
2010
Springer
15 years 9 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ICCCN
2007
IEEE
15 years 5 months ago
Algorithms for Communication in Wireless multi-hop ad hoc Networks using Broadcasts in Opportunistic Large Arrays (OLA)
A new physical layer technique [1] for broadcasting in multi-hop wireless ad hoc networks makes broadcast a much more efficient building block than traditional flooding broadcast. ...
Edoardo S. Biagioni
DFN
2004
15 years 3 months ago
Prototype Implementation of Anycast-based Service Discovery for Mobile Ad Hoc Networks
: Mobile ad hoc networks are self-organized, and devices in such networks have to locate available services dynamically. We propose to utilize anycast for efficient service discove...
Jidong Wu, Oliver Stanze, Kilian Weniger, Martina ...