Sciweavers

2634 search results - page 347 / 527
» Infrastructured Ad Hoc Networks
Sort
View
JCM
2008
69views more  JCM 2008»
15 years 4 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 4 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
CSUR
2007
69views more  CSUR 2007»
15 years 4 months ago
A survey on peer-to-peer key management for mobile ad hoc networks
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...