Sciweavers

1677 search results - page 13 / 336
» A distributed security scheme for ad hoc networks
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
IWCMC
2006
ACM
14 years 1 months ago
DSMA: an access method for MIMO ad hoc networks based on distributed scheduling
In this work, we analyze the effects of a distributed transmission coordination scheme that is particularly suited for ad hoc networks with the ability to exploit spatially–mult...
Paolo Casari, Marco Levorato, Michele Zorzi
ADHOC
2008
118views more  ADHOC 2008»
13 years 7 months ago
A localized certificate revocation scheme for mobile ad hoc networks
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environ...
Geneviève Arboit, Claude Crépeau, Ca...
WCNC
2008
IEEE
14 years 2 months ago
Adaptive Routing in Dynamic Ad Hoc Networks
Abstract—Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and...
Cong Liu, Jie Wu
GLOBECOM
2009
IEEE
13 years 11 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang