Sciweavers

345 search results - page 16 / 69
» A Distributed Light-Weight Authentication Model for Ad-hoc N...
Sort
View
MOBIHOC
2003
ACM
14 years 7 months ago
The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way)
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizi...
Tara Small, Zygmunt J. Haas
ICCCN
2008
IEEE
14 years 1 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
LCN
2008
IEEE
14 years 1 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ICC
2008
IEEE
120views Communications» more  ICC 2008»
14 years 1 months ago
Invariance Property of Isotropic Random Walk Mobility Patterns in Mobile Ad-Hoc Networks
—The class of isotropic random walk mobility models, including Random Direction mobility model, Random Walk mobility model and Brownian motion mobility model, has been widely use...
Han Cai, Chul-Ho Lee, Do Young Eun
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano