Sciweavers

1259 search results - page 172 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
MDM
2009
Springer
138views Communications» more  MDM 2009»
14 years 2 months ago
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
—In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduli...
Adrian Daniel Popescu, Mohamed A. Sharaf, Cristian...
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
TPDS
2010
145views more  TPDS 2010»
13 years 6 months ago
Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
—In this paper, we consider the issue of efficient broadcasting in mobile ad hoc networks (MANETs) using network coding and directional antennas. Network coding-based broadcastin...
Shuhui Yang, Jie Wu
AINA
2008
IEEE
14 years 2 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...