Sciweavers

389 search results - page 11 / 78
» An ad hoc networking scheme in hybrid networks for emergency...
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ISPA
2004
Springer
14 years 25 days ago
Asynchronous Document Dissemination in Dynamic Ad Hoc Networks
Abstract This paper presents a document-oriented model for information dissemination in dynamic ad hoc networks, such as those composed of highly mobile and volatile communicating ...
Frédéric Guidec, Hervé Roussa...
INFOCOM
2003
IEEE
14 years 22 days ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ESAS
2004
Springer
14 years 26 days ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
ICPPW
1999
IEEE
13 years 11 months ago
An On-Demand Shared Tree with Hybrid State for Multicast Routing in Ad Hoc Mobile Wireless Networks
This paper describes the Multicast Shared Tree Protocol MSTP that has been designed to support the delivery of multicast packets in a mobile ad hoc network. MSTP uses a shared tre...
Elena Pagani, Gian Paolo Rossi