Sciweavers

662 search results - page 40 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
ADHOCNOW
2004
Springer
14 years 2 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
JNW
2008
116views more  JNW 2008»
13 years 7 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
WORDS
2005
IEEE
14 years 2 months ago
Delay Analysis for Statistical Real-Time Channels in Mobile Ad-Hoc Networks
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
Min-Gu Lee, Sunggu Lee
ICC
2007
IEEE
134views Communications» more  ICC 2007»
14 years 3 months ago
A MAC Protocol for Maximum Stream Allocation Depending on the Number of Antennas and Received RTS Packets in MIMO Ad Hoc Network
— MIMA-MAC is the most attractive MAC protocol for MIMO ad hoc networks, which consist of nodes with multiple antennas. MIMA-MAC, however, uses only a half of antennas for data t...
Motoki Shirasu, Iwao Sasase
ADHOC
2007
144views more  ADHOC 2007»
13 years 9 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac