Sciweavers

777 search results - page 97 / 156
» On Secure Mobile Ad hoc Routing
Sort
View
WIMOB
2009
IEEE
14 years 3 months ago
Multipath Routing in MANETs Using Multiple Description Coding
—Routing in ad hoc networks is a well known issue. Most of the previous propositions to route data between two nodes aimed to define a path (sometimes several ones) on which pac...
Eddy Cizeron, Salima Hamma
ICOIN
2001
Springer
14 years 1 months ago
SOM: Spiral-Fat-Tree-Based On-Demand Multicast Protocol in a Wireless Ad-Hoc Network
A mobile ad-hoc network (MANET) is a characteristized by multi-hop wireless links, in the absence of any cellular infrastructure, as well as frequent host mobility. Existing on-de...
Yuh-Shyan Chen, Tzung-Shi Chen, Ching-Jang Huang
TMC
2008
125views more  TMC 2008»
13 years 9 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
WS
2005
ACM
14 years 2 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ADHOC
2007
134views more  ADHOC 2007»
13 years 8 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu