Sciweavers

662 search results - page 49 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
ISCC
2007
IEEE
100views Communications» more  ISCC 2007»
14 years 3 months ago
End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks
Many methods for end-to-end bandwidth estimation on wired networks assume that link capacities are constant and that all cross-traffic interaction occurs through queuing delays at...
Marco A. Alzate, Maria P. Salamanca, Néstor...
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...
ADHOCNOW
2005
Springer
14 years 2 months ago
Message Stability and Reliable Broadcasts in Mobile Ad-Hoc Networks
Abstract. Many to many reliable broadcast is useful while building distributed services like group membership and agreement in a MANET. Efforts in implementing reliable broadcast ...
Kulpreet Singh, Andronikos Nedos, Gregor Gärt...
GLOBECOM
2006
IEEE
14 years 2 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian
JCS
2006
116views more  JCS 2006»
13 years 8 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...