Sciweavers

1247 search results - page 56 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
ISCC
2002
IEEE
169views Communications» more  ISCC 2002»
15 years 9 months ago
Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
MSWIM
2003
ACM
15 years 9 months ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...
PERCOM
2007
ACM
16 years 4 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
IJNSEC
2008
160views more  IJNSEC 2008»
15 years 4 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson