Sciweavers

255 search results - page 35 / 51
» Non-interactive key establishment in mobile ad hoc networks
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
13 years 8 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...
ADHOCNOW
2008
Springer
14 years 3 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...
SCN
2010
Springer
120views Communications» more  SCN 2010»
13 years 3 months ago
Identity crisis: on the problem of namespace design for ID-PKC and MANETs
In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
MOBICOM
2004
ACM
14 years 2 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
ICDCSW
2003
IEEE
14 years 1 months ago
Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs ar...
Gang Xu, Cristian Borcea, Liviu Iftode