Sciweavers

702 search results - page 10 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
ICDCSW
2007
IEEE
14 years 1 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
PEWASUN
2004
ACM
14 years 29 days ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
SASN
2003
ACM
14 years 24 days ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
IPCCC
2006
IEEE
14 years 1 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...