Sciweavers

899 search results - page 149 / 180
» VoIP Communications in Wireless Ad-hoc Network with Gateways
Sort
View
SASN
2005
ACM
15 years 7 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
PAAMS
2010
Springer
15 years 5 months ago
Mobile Agents in Vehicular Networks: Taking a First Ride
A vehicular ad hoc network (VANET) is a type of mobile network whose nodes are traveling cars which communicate with one another using short-range wireless communications. These ca...
Oscar Urra, Sergio Ilarri, Thierry Delot, Eduardo ...
MOBIHOC
2003
ACM
16 years 1 months ago
Worst-Case optimal and average-case efficient geometric ad-hoc routing
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
CNSR
2004
IEEE
15 years 5 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald