Sciweavers

1321 search results - page 215 / 265
» On the Age of Pseudonyms in Mobile Ad Hoc Networks
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
PERCOM
2003
ACM
14 years 7 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
AIMS
2008
Springer
14 years 2 months ago
Cooperation under Scarcity: The Sharer's Dilemma
Abstract. Many researchers have used game theory to study the problem of encouraging cooperation in peer-to-peer and mobile ad hoc networks, where resources are provided collective...
Michael Rogers, Saleem Bhatti
GLOBECOM
2008
IEEE
14 years 2 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
ICCS
2007
Springer
14 years 1 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong