Sciweavers

1835 search results - page 70 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
ADHOCNOW
2004
Springer
15 years 3 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
WCE
2007
14 years 11 months ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
—Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
WCNC
2008
IEEE
15 years 4 months ago
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks
— Vehicular Ad-hoc Networks (VANETs) are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastru...
Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou
ADHOCNOW
2003
Springer
15 years 3 months ago
A Uniform Continuum Model for Scaling of Ad Hoc Networks
This paper models an ad-hoc network as a continuum of nodes, ignoring edge effects, to find how the traffic scales with N, the number of nodes. We obtain expressions for the traffi...
Ernst W. Grundke, A. Nur Zincir-Heywood