Sciweavers

675 search results - page 10 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
PUC
2002
107views more  PUC 2002»
13 years 7 months ago
Location Models from the Perspective of Context-Aware Applications and Mobile Ad Hoc Networks
Location models are crucial to location-aware applications. In this paper we present two approaches for modeling location information in an infrastructure-based and an ad hoc netwo...
Martin Bauer, Christian Becker, Kurt Rothermel
ADHOC
2006
95views more  ADHOC 2006»
13 years 7 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ESAS
2007
Springer
14 years 1 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 1 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
ADHOC
2005
122views more  ADHOC 2005»
13 years 7 months ago
Maintaining weakly-connected dominating sets for clustering ad hoc networks
An ad hoc network is a multihop wireless communication network supporting mobile users. Network performance degradation is a major problem as the network becomes larger. Clusterin...
Yuanzhu Peter Chen, Arthur L. Liestman