Sciweavers

605 search results - page 74 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
CONEXT
2007
ACM
14 years 21 days ago
Securing BGP incrementally
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it bec...
Martin Suchara, Ioannis C. Avramopoulos, Jennifer ...
IWCMC
2009
ACM
14 years 3 months ago
On fault tolerant ad hoc network design
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Wasim El-Hajj, Hazem Hajj, Zouheir Trabelsi
JCIT
2007
142views more  JCIT 2007»
13 years 8 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 8 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
IFM
2005
Springer
14 years 2 months ago
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks
Abstract. We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for t...
Lars Michael Kristensen, Michael Westergaard, Pede...