Sciweavers

1835 search results - page 152 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
PERCOM
2007
ACM
15 years 10 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
IPPS
2006
IEEE
15 years 4 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
91
Voted
AINA
2011
IEEE
14 years 2 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
ISCIS
2005
Springer
15 years 4 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy
87
Voted
COORDINATION
2007
Springer
15 years 5 months ago
Object-Oriented Coordination in Mobile Ad Hoc Networks
Abstract. We introduce an object-oriented referencing abstraction to express coordination between objects hosted on mobile devices interconnected by a wireless ad hoc network. On t...
Tom Van Cutsem, Jessie Dedecker, Wolfgang De Meute...