Sciweavers

333 search results - page 21 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 8 months ago
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or ene...
Shuchita Upadhayaya, Charu Gandhi
JNW
2006
186views more  JNW 2006»
13 years 8 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...

Publication
137views
15 years 6 months ago
Optimal Flooding Protocol for Routing in Ad-Hoc Networks
Location discovery is a fundamental problem in wireless ad hoc networks. Most of the ad hoc routing protocols use some form of flooding to discover the location and route of a mobi...
Vamsi K. Parachuri, Arjan Durresi, Durga S. Dash, ...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik