Sciweavers

221 search results - page 37 / 45
» Ad hoc broadcast encryption
Sort
View
MOBIHOC
2003
ACM
14 years 10 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ISCC
2002
IEEE
14 years 3 months ago
Performance of group communication over ad-hoc networks
We study the performance of reliable and unreliable allnode broadcast over ad-hoc networks that use contentionbased channel access. To obtain analytical results while preserving h...
Marc Mosko, J. J. Garcia-Luna-Aceves
CORR
2011
Springer
177views Education» more  CORR 2011»
13 years 2 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
ICW
2005
IEEE
209views Communications» more  ICW 2005»
14 years 4 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
14 years 11 days ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin