Sciweavers

2634 search results - page 195 / 527
» Infrastructured Ad Hoc Networks
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
15 years 2 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
IEEEIAS
2008
IEEE
15 years 11 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
WS
2005
ACM
15 years 10 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
INFOCOM
2002
IEEE
15 years 9 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
CN
2010
152views more  CN 2010»
15 years 4 months ago
An environment-aware mobility model for wireless ad hoc network
Simulation is a cost effective, fast and flexible alternative to test-beds or practical deployment for evaluating the characteristics and potential of mobile ad hoc networks. Sinc...
Sabbir Ahmed, Gour C. Karmakar, Joarder Kamruzzama...