Sciweavers

675 search results - page 24 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ADHOCNOW
2008
Springer
14 years 2 months ago
Mitigating Reply Implosions in Query-Based Service Discovery Protocols for Mobile Wireless Ad Hoc Networks
Providing service discovery in an efficient and scalable way in ad hoc networks is a challenging problem, in particular for multihop scenarios, due to the large number of potential...
Antônio Tadeu A. Gomes, Artur Ziviani, Lucia...
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
14 years 23 days ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 2 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
VTC
2006
IEEE
118views Communications» more  VTC 2006»
14 years 2 months ago
A Space-Time based Approach to Solving the Gain Asymmetry in MIMO ad hoc Networks
— The problem of gain asymmetry in MIMO ad-hoc networks is outlined and the solutions proposed in literature are surveyed. The protocol in [1] approach is analyzed and its delay ...
Francesco Rossetto, Michele Zorzi
ENTCS
2006
173views more  ENTCS 2006»
13 years 8 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin