Sciweavers

125 search results - page 20 / 25
» Energy-efficient anonymous multicast in mobile ad-hoc networ...
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 8 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
VTC
2010
IEEE
173views Communications» more  VTC 2010»
13 years 5 months ago
Streetcast: An Urban Broadcast Protocol for Vehicular Ad-Hoc Networks
—Vehicular Ad-hoc NETworks (VANETs) adopting Dedicated Short-Range Communications (DSRCs) have emerged as a preferred choice of network design for the Intelligent Transportation ...
Chih-Wei Yi, Yi-Ta Chuang, Hou-Heng Yeh, Yu-Chee T...
IJNSEC
2008
152views more  IJNSEC 2008»
13 years 7 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
ESAS
2004
Springer
14 years 25 days ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
INFOCOM
2009
IEEE
14 years 2 months ago
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding
—This paper characterizes the throughput-delay tradeoffs in mobile ad hoc networks (MANETs) with network coding, and compares results in the situation where only replication and ...
Chi Zhang, Yuguang Fang, Xiaoyan Zhu