Sciweavers

1017 search results - page 26 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
ICWN
2009
13 years 6 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
INFOCOM
2010
IEEE
13 years 7 months ago
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Delia Ciullo, Valentina Martina, Michele Garetto, ...
GLOBECOM
2007
IEEE
14 years 2 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...
IDEAS
2002
IEEE
223views Database» more  IDEAS 2002»
14 years 1 months ago
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks
Energy saving is the most important issue in wireless mobile computing due to power constraints on mobile units. Data broadcasting is the main method of information dissemination ...
Le Gruenwald, Muhammad Javed, Meng Gu
ADHOCNOW
2004
Springer
14 years 1 months ago
Routing Table Dynamics in Mobile Ad-Hoc Networks: A Continuum Model
Abstract. This paper gives a simple continuum model for generic proactive routing protocols in a mobile ad-hoc network. Rate constants characterize the routing protocol and the net...
Ernst W. Grundke