Sciweavers

221 search results - page 38 / 45
» Ad hoc broadcast encryption
Sort
View
SECON
2007
IEEE
14 years 4 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
BIOWIRE
2007
Springer
14 years 4 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
WINET
2008
100views more  WINET 2008»
13 years 10 months ago
SOLONet: Sub-optimal location-aided overlay network for MANETs
Overlay networks have made it easy to implement multicast functionality in wireless ad hoc networks. Their flexibility to adapt to different environments has helped in their stead...
Abhishek P. Patil, Yunhao Liu, Li Xiao, Abdol-Hoss...
TCOM
2010
168views more  TCOM 2010»
13 years 5 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
ACNS
2006
Springer
90views Cryptology» more  ACNS 2006»
14 years 4 months ago
Stateful Subset Cover
Abstract. This paper describes a method to convert stateless key revocation schemes based on the subset cover principle into stateful schemes. The main motivation is to reduce the ...
Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm