Sciweavers

182 search results - page 29 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
13 years 8 months ago
A Survey of Mobility Management in Hybrid Wireless Mesh Networks
Mobility management is vital for realizing large-scale wireless mesh networks to provide cost-effective broadband Internet access. Although a considerable amount of research on mo...
Jiang Xie, Xudong Wang
CN
2007
124views more  CN 2007»
13 years 8 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
GLOBECOM
2006
IEEE
14 years 2 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian
DEXA
2008
Springer
98views Database» more  DEXA 2008»
13 years 10 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter
IJIPT
2008
191views more  IJIPT 2008»
13 years 8 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah