Sciweavers

221 search results - page 21 / 45
» Ad hoc broadcast encryption
Sort
View
PERVASIVE
2004
Springer
14 years 3 months ago
A Distributed Precision Based Localization Algorithm for Ad-Hoc Networks
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the dista...
Leon Evers, Stefan Dulman, Paul J. M. Havinga
EUROCRYPT
2008
Springer
13 years 11 months ago
Threshold RSA for Dynamic and Ad-Hoc Groups
Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
ADHOCNOW
2005
Springer
14 years 3 months ago
Location Tracking in Mobile Ad Hoc Networks Using Particle Filters
Mobile ad hoc networks (MANET) are dynamic networks formed on-the-fly as mobile nodes move in and out of each others’ transmission ranges. In general, the mobile ad hoc networki...
Rui Huang, Gergely V. Záruba
PEWASUN
2004
ACM
14 years 3 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...