Sciweavers

1321 search results - page 105 / 265
» On the Age of Pseudonyms in Mobile Ad Hoc Networks
Sort
View
ICDCS
2006
IEEE
14 years 2 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
ICIP
2006
IEEE
14 years 9 months ago
Multi Source Streaming for Robust Video Transmission in Mobile Ad-Hoc Networks
Video transmission over networks is getting increasingly important, thus upcoming network types like Mobile Ad-Hoc Networks (MANETs) can also become a suitable platform for exchan...
Cornelius Hellge, Karsten Gänger, Thomas Schi...
LCN
2008
IEEE
14 years 2 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
PERCOM
2009
ACM
14 years 8 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
SECON
2008
IEEE
14 years 2 months ago
Feasibility of an Aeronautical Mobile Ad Hoc Network Over the North Atlantic Corridor
—In the near future, broadband air-ground (A/G) communications will be used by civil aviation aircraft flying over crowded continental areas such as Europe and North America to ...
Daniel Medina, Felix Hoffmann, Serkan Ayaz, Carl-H...