Sciweavers

702 search results - page 8 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
ICWN
2004
13 years 9 months ago
A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks
Abstract--This paper presents a model for the dissemination of information in highly dynamic ad hoc networks, such as those composed of mobile communicating devices. This model rel...
Hervé Roussain, Frédéric Guid...
TIFS
2008
149views more  TIFS 2008»
13 years 7 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
POLICY
2004
Springer
14 years 27 days ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
WS
2003
ACM
14 years 24 days ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas