Sciweavers

1317 search results - page 204 / 264
» Mobile ad hoc networking and the IETF
Sort
View
ESAS
2007
Springer
14 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
ADHOC
2007
73views more  ADHOC 2007»
13 years 9 months ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve
ENTCS
2007
131views more  ENTCS 2007»
13 years 8 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
SAC
2005
ACM
14 years 2 months ago
Dynamic group communication in mobile peer-to-peer environments
This paper presents an approach to integrate publish/subscribe semantics with on-demand multicast in wireless ad hoc networks, providing dynamic group communication with fine-gra...
Eiko Yoneki, Jean Bacon
INTERSENSE
2006
ACM
14 years 2 months ago
Particle-based methodology for representing mobile ad-hoc networks
—We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism wit...
Carlos J. Martinez, Marisa López, Luis C. E...