Sciweavers

671 search results - page 80 / 135
» Trust evaluation in ad-hoc networks
Sort
View
BROADNETS
2007
IEEE
15 years 6 months ago
Practical time synchronization for Bluetooth Scatternets
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Matthias Ringwald, Kay Römer
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 1 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 6 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
89
Voted
MMS
2007
15 years 1 months ago
An Experimental Frame for Evaluating Service Trading Overlays in Mobile ad-hoc Networks
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Mathias Röhl, Adelinde M. Uhrmacher, Birgitta...
BIOWIRE
2007
Springer
15 years 6 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...