Sciweavers

671 search results - page 25 / 135
» Trust evaluation in ad-hoc networks
Sort
View
127
Voted
MWCN
2004
Springer
15 years 7 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
157
Voted
IFIP8
2004
15 years 3 months ago
Ad hoc Service Grid - A Self-Organizing Infrastructure for Mobile Commerce
: The provisioning of location-specific services in medium-sized facilities like shopping malls, hospitals, and trade fares using WLAN access points or cellular phone systems has s...
Klaus Herrmann, Kurt Geihs, Gero Mühl
143
Voted
CCS
2010
ACM
14 years 11 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
WIMOB
2008
IEEE
15 years 8 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...