Sciweavers

851 search results - page 115 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 8 months ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
IJNSEC
2008
152views more  IJNSEC 2008»
13 years 8 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
BROADNETS
2006
IEEE
14 years 2 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 3 months ago
Impact of Transmission Power on the Performance of UDP in Vehicular Ad Hoc Networks
—With the availability of cheap and robust wireless devices there is demand for new applications in Vehicular Ad-hoc Networks (VANET). The challenge in implementing applications ...
Behrooz Khorashadi, Andrew Chen, Dipak Ghosal, Che...
SPW
2000
Springer
14 years 8 days ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano