Sciweavers

113 search results - page 8 / 23
» A Mechanism Design-Based Secure Architecture for Mobile Ad H...
Sort
View
ADHOCNOW
2006
Springer
14 years 2 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
JSAC
2006
136views more  JSAC 2006»
13 years 8 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
ADHOC
2005
176views more  ADHOC 2005»
13 years 8 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
WONS
2005
IEEE
14 years 2 months ago
Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery arch...
Paal Engelstad, Yan Zheng
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...