Sciweavers

182 search results - page 26 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
EURONGI
2008
Springer
13 years 10 months ago
Connectivity Gateway Discovery in MANETs
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
Antonio J. Yuste, Alicia Triviño-Cabrera, F...
CCS
2008
ACM
13 years 10 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
INFOCOM
2006
IEEE
14 years 2 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
GLOBECOM
2010
IEEE
13 years 6 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
PEWASUN
2006
ACM
14 years 2 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt