Sciweavers

22 search results - page 1 / 5
» Key revocation based on Dirichlet multinomial model for mobi...
Sort
View
LCN
2008
IEEE
14 years 1 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ADHOCNOW
2006
Springer
14 years 29 days ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
CCS
2008
ACM
13 years 9 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ITCC
2005
IEEE
14 years 17 days ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
JNW
2006
82views more  JNW 2006»
13 years 7 months ago
Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware
Simulation is the most important and widely used method in the research of Mobile Ad hoc NETworks (MANET). The topology of MANET and the mobility of mobile nodes are the key factor...
Gang Lu, Gordon A. Manson, Demetrios Belis