Sciweavers

510 search results - page 21 / 102
» Security issues in control, management and routing protocols
Sort
View
JNSM
2002
218views more  JNSM 2002»
14 years 11 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
JSAC
2011
142views more  JSAC 2011»
14 years 6 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
91
Voted
ICOIN
2001
Springer
15 years 4 months ago
An Intelligent On-Demand Multicast Routing Protocol in Ad Hoc Networks
In thispaper; we present an intelligent on-demandmulticast routing protocol (IOD-MRP)which is suited in rapidly changing network environments, such as ad hoc networks. This protoc...
Kuochen Wang, Chaou-Tang Chang
CSREASAM
2006
15 years 1 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
87
Voted
CCS
2010
ACM
15 years 4 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...