Sciweavers

345 search results - page 28 / 69
» A Distributed Light-Weight Authentication Model for Ad-hoc N...
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 11 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
The Analysis of Publish/Subscribe Systems over Mobile Wireless Ad Hoc Networks
In this work, we analyze the publish/subscribe distributed system paradigm over mobile ad hoc networks with respect to the performance and the impact of different mobility speeds ...
Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun...
JSAC
2011
137views more  JSAC 2011»
12 years 10 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
ICNP
2002
IEEE
14 years 17 days ago
Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks
This paper presents the first analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed accord...
Yu Wang, J. J. Garcia-Luna-Aceves
ICDCSW
2007
IEEE
14 years 1 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...