Sciweavers

1359 search results - page 17 / 272
» Equational Reasoning on Mobile Ad Hoc Networks
Sort
View
BROADNETS
2006
IEEE
14 years 1 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
ISCAPDCS
2003
13 years 8 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
PERCOM
2006
ACM
14 years 7 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
MOBIHOC
2005
ACM
14 years 7 months ago
Towards commercial mobile ad hoc network applications: a radio dispatch system
Elgan Huang, Wenjun Hu, Jon Crowcroft, Ian J. Wass...