Sciweavers

702 search results - page 21 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
TMC
2010
193views more  TMC 2010»
13 years 7 months ago
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks
—In mobile ad hoc networks, there are many applications in which mobile users share information, e.g., collaborative rescue operations at a disaster site and exchange of word-of-...
Takahiro Hara
MOBIHOC
2007
ACM
14 years 8 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
MOBIHOC
2005
ACM
14 years 8 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
NDSS
2002
IEEE
14 years 1 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...