Sciweavers

255 search results - page 29 / 51
» Non-interactive key establishment in mobile ad hoc networks
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 10 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
ESAS
2004
Springer
14 years 2 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
ADHOC
2007
173views more  ADHOC 2007»
13 years 8 months ago
An adaptive transmission-scheduling protocol for mobile ad hoc networks
Transmission-scheduling protocols can support contention-free link-level broadcast transmissions and delay sensitive traffic in mobile, multiple-hop packet radio networks. Use of t...
Praveen K. Appani, Joseph L. Hammond, Daniel L. No...
WIOPT
2005
IEEE
14 years 2 months ago
Analysis of a Distributed Algorithm to Determine Multiple Routes with Path Diversity in Ad Hoc Networks
With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to pr...
Stephen Mueller, Dipak Ghosal
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
: Problem statement: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. Approach: In this research we proposed a...
Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al...