Sciweavers

454 search results - page 30 / 91
» An Authenticated Broadcasting Scheme for Wireless Ad Hoc Net...
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
Adaptive Routing in Dynamic Ad Hoc Networks
Abstract—Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and...
Cong Liu, Jie Wu
ESAS
2007
Springer
14 years 1 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung
WIOPT
2006
IEEE
14 years 1 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 9 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin