Sciweavers

662 search results - page 24 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
TMM
2011
160views more  TMM 2011»
13 years 2 months ago
Routing-Aware Multiple Description Video Coding Over Mobile Ad-Hoc Networks
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...
Yiting Liao, Jerry D. Gibson
IAJIT
2008
139views more  IAJIT 2008»
13 years 7 months ago
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
: Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in ...
Velmurugan Ayyadurai, Rajaram Ramasamy
TMC
2008
152views more  TMC 2008»
13 years 7 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
PERCOM
2007
ACM
14 years 7 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...