Sciweavers

851 search results - page 112 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 3 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TDSC
2011
13 years 3 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
CAISE
2003
Springer
14 years 1 months ago
Sharing Mobile Databases in Dynamically Configurable Environments
We define a Mobile Database Community (MDBC) as a dynamic collection of autonomous mobile databases in which each database user can access databases in the community through a wir...
Angelo Brayner, José de Aguiar Moraes Filho
EVOW
2009
Springer
14 years 3 months ago
Wireless Communications for Distributed Navigation in Robot Swarms
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...
WCNC
2008
IEEE
14 years 3 months ago
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models
—In performance studies of vehicular ad hoc networks (VANETs), the underlying mobility model plays an important role. Since conventional mobile ad hoc network (MANET) routing pro...
Pei'en Luo, Hongyu Huang, Wei Shu, Minglu Li, Min-...