Sciweavers

775 search results - page 23 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
PERCOM
2007
ACM
14 years 10 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
ICCCN
2007
IEEE
14 years 5 months ago
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks
—In this paper we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the Quality of Service (QoS) in th...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata
NETWORKING
2004
14 years 6 days ago
Scalable Service Discovery in Mobile Ad Hoc Networks
Uday Mohan, Kevin C. Almeroth, Elizabeth M. Beldin...
ADHOCNOW
2008
Springer
14 years 5 months ago
Mitigating Reply Implosions in Query-Based Service Discovery Protocols for Mobile Wireless Ad Hoc Networks
Providing service discovery in an efficient and scalable way in ad hoc networks is a challenging problem, in particular for multihop scenarios, due to the large number of potential...
Antônio Tadeu A. Gomes, Artur Ziviani, Lucia...
SASN
2003
ACM
14 years 4 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...