Sciweavers

1321 search results - page 260 / 265
» On the Age of Pseudonyms in Mobile Ad Hoc Networks
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
EURONGI
2005
Springer
14 years 1 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
WIMOB
2008
IEEE
14 years 2 months ago
AVERT: Adaptive SerVicE and Route Discovery ProTocol for MANETs
—In the past few years there has been increasing research interest in service discovery protocols for Mobile Ad Hoc Networks (MANET). The most promising approaches so far address...
Christopher N. Ververidis, George C. Polyzos
SECON
2007
IEEE
14 years 1 months ago
The Optimum Number of OSPF Areas for MANETs
—Mobile ad hoc networks (MANETs) are a critical technology in filling the gap where the network infrastructure is insufficient or does not exist at all. The dynamic topology of...
Jangeun Jun, Mihail L. Sichitiu, Hector D. Flores,...
CHI
2005
ACM
13 years 9 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins