Sciweavers

1677 search results - page 14 / 336
» A distributed security scheme for ad hoc networks
Sort
View
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 18 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ICWN
2004
13 years 9 months ago
A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad Hoc Network
In this paper, we classified existing address autoconfiguration schemes based on two communication models: centralized and distributed schemes. We defined performance metrics and ...
Soyeon Ahn, Namhoon Kim, Woohyun Kim, Younghee Lee
COMSUR
2006
96views more  COMSUR 2006»
13 years 7 months ago
A survey of multipoint relay based broadcast schemes in wireless ad hoc networks
Almost every routing protocol in mobile ad hoc networks (MANETs) depends on a broadcast scheme to disseminate routing information. For this reason, creating an efficient broadcast...
Ou Liang, Y. Ahmet Sekercioglu, Nallasamy Mani
MOBICOM
2006
ACM
14 years 1 months ago
A replica distrubution scheme for location-dependent information on vehicular ad hoc networks
In this paper we propose Road-aware Skip Copy (RSC) method for distributing replicas of location-dependent data on server-less vehicular ad hoc networks in urban areas. In the RSC...
M. Yamanaka, G. Tsuchida, S. Ishihara