Sciweavers

775 search results - page 60 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
154
Voted
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 9 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
125
Voted
ICPPW
2002
IEEE
15 years 9 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 10 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
159
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...
ICCSA
2009
Springer
15 years 11 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim