Sciweavers

1394 search results - page 25 / 279
» Wireless Ad Hoc Podcasting
Sort
View
122
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CNSR
2007
IEEE
101views Communications» more  CNSR 2007»
15 years 3 months ago
The Theory of Natural Movement and its Application to the Simulation of Mobile Ad Hoc Networks (MANET)
The theory of natural movement is fundamental to space syntax: a set of theories and methods developed in the late 1970s that seeks, at a general level, to reveal the mutual effec...
Nick Sheep Dalton, Ruth Conroy Dalton
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
GLOBECOM
2006
IEEE
15 years 3 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
CORR
2007
Springer
93views Education» more  CORR 2007»
14 years 9 months ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...