Sciweavers

1498 search results - page 67 / 300
» A Process Calculus for Mobile Ad Hoc Networks
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
ISCC
2002
IEEE
146views Communications» more  ISCC 2002»
14 years 23 days ago
How bad TCP can perform in mobile ad hoc networks
Several recent studies have indicated that TCP performance degrades significantly in mobile ad hoc networks. This paper examines how bad TCP may perform in such networks and prov...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
LCN
1998
IEEE
14 years 3 days ago
QoS Routing in Ad Hoc Wireless Networks
Abstract-- The emergence of nomadic applications have recently generated much interest in wireless network infrastructures that support real-time communications. In this paper, we ...
C. R. Lin
EUROPKI
2004
Springer
14 years 1 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner