Sciweavers

702 search results - page 7 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
MATA
2005
Springer
192views Communications» more  MATA 2005»
14 years 1 months ago
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks
Abstract. In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we p...
Marco Avvenuti, Alessio Vecchio, Giovanni Turi
COMPSAC
2003
IEEE
14 years 25 days ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
CN
2004
163views more  CN 2004»
13 years 7 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
ICNP
2003
IEEE
14 years 25 days ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
MOBIHOC
2005
ACM
14 years 7 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...