Sciweavers

303 search results - page 28 / 61
» A Lightweight Scheme for Auto-configuration in Mobile Ad Hoc...
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 2 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
ADHOC
2007
134views more  ADHOC 2007»
13 years 8 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
IJHPCN
2006
114views more  IJHPCN 2006»
13 years 9 months ago
Improved schemes for power-efficient broadcast in ad hoc networks
: Ad hoc wireless networks are a special type of wireless network in which a collection of mobile hosts (nodes) with wireless network interfaces may form a temporary network withou...
Xiao Chen, Jian Shen
WD
2010
13 years 6 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla