Sciweavers

675 search results - page 13 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
WIOPT
2010
IEEE
13 years 6 months ago
A multiobjective performance evaluation framework for routing in wireless ad hoc networks
—Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design...
Katia Jaffrès-Runser, Mary R. Schurgot, Cri...
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
13 years 10 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
ITCC
2005
IEEE
14 years 2 months ago
Energy Balanced Broadcasting Through Delayed Intelligence
— Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have mad...
Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan...
PERCOM
2007
ACM
14 years 8 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
: Problem statement: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. Approach: In this research we proposed a...
Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al...