Sciweavers

662 search results - page 106 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
ACSAC
2004
IEEE
14 years 17 days ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 3 months ago
Degrees of Freedom of Cooperative MIMO in Cellular Networks
— In cellular networks, relays and/or mobiles can cooperate to improve the overall system performance. For example, once the transmission from a base station with multiple antenn...
Si-Hyeon Lee, Sae-Young Chung
OTM
2009
Springer
14 years 3 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
IWCMC
2006
ACM
14 years 2 months ago
Performance analysis of epidemic routing under contention
Epidemic routing has been proposed as a robust transmission scheme for sparse mobile ad hoc networks. Under the assumption of no contention, epidemic routing has the minimum end-t...
Apoorva Jindal, Konstantinos Psounis
SISW
2005
IEEE
14 years 2 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok