Sciweavers

221 search results - page 30 / 45
» Ad hoc broadcast encryption
Sort
View
ESAS
2007
Springer
14 years 3 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
ESA
2003
Springer
98views Algorithms» more  ESA 2003»
14 years 2 months ago
Network Lifetime and Power Assignment in ad hoc Wireless Networks
In ad-hoc wireless networks, certain network connectivity constraints are of interest because of their practical importance. An example of such a constraint would be strong connec...
Gruia Calinescu, Sanjiv Kapoor, Alexander Olshevsk...
PRDC
2002
IEEE
14 years 2 months ago
Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks
This paper reevaluates the multicast protocols for MANETs in terms of energy efficiency and proposes a new robust multicast protocol, called Two-Tree Multicast (TTM). Multicast pr...
Sangman Moh, Chansu Yu, Ben Lee, Hee Yong Youn
ICUMT
2009
13 years 7 months ago
A theoretical model for opportunistic routing in ad hoc networks
Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been call...
Angela Sara Cacciapuoti, Marcello Caleffi, Luigi P...
ICC
2007
IEEE
220views Communications» more  ICC 2007»
14 years 4 months ago
Broadcasting Protocols for Multi-Radio Multi-Channel and Multi-Rate Mesh Networks
— A vast amount of broadcasting protocols has been developed for wireless ad hoc networks. To the best of our knowledge, however, these protocols assume a single-radio singlechan...
Min Song, Jun Wang, Qun Hao