Sciweavers

1259 search results - page 40 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
AINA
2008
IEEE
14 years 2 months ago
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People Networks
With wireless technologies extending to every part of our daily lives, mobile networking applications are becoming increasingly popular for accessing the Internet. In this paper, ...
Ling-Jyh Chen, Ting-Kai Huang
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 2 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
MOBIHOC
2002
ACM
14 years 7 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
ICC
2007
IEEE
14 years 2 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...
IPPS
2008
IEEE
14 years 2 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu