Sciweavers

612 search results - page 48 / 123
» Engineering Incentive Schemes for Ad Hoc Networks
Sort
View
UIC
2007
Springer
14 years 1 months ago
Mobility Tracking for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), nodes mobility cause network topologies to change dynamically over time, which complicates important tasks such as broadcasting and routing. Mob...
Hui Xu, Min Meng, Jinsung Cho, Brian J. d'Auriol, ...
ICC
2009
IEEE
146views Communications» more  ICC 2009»
13 years 5 months ago
Multi-Hop Aggregate Information Efficiency in Wireless Ad Hoc Networks
Abstract--We introduce multi-hop aggregate information efficiency (MIEA), a comprehensive metric that captures several performance-affecting factors of wireless ad hoc networks in ...
Pedro Henrique Juliano Nardelli, Giuseppe Thadeu F...
WS
2005
ACM
14 years 1 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 11 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao