Sciweavers

640 search results - page 18 / 128
» Secure multicast groups on ad hoc networks
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks
—This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of ns multicast sessions. Each mult...
Shan Zhou, Lei Ying
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 20 days ago
A Near Optimal Localized Heuristic for Voice Multicasting over Ad Hoc Wireless Networks
Abstract-- Providing real-time voice multicasting over multihop ad hoc wireless networks is a challenging task. The unique characteristics of voice traffic (viz. small packet size,...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
IANDC
2008
84views more  IANDC 2008»
13 years 7 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
ICC
2011
IEEE
253views Communications» more  ICC 2011»
12 years 8 months ago
Geo-Assisted Multicast Inter-Domain Routing (GMIDR) Protocol for MANETs
Abstract— Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and ...
Konglin Zhu, Biao Zhou, Xiaoming Fu, Mario Gerla
INFOCOM
2003
IEEE
14 years 2 months ago
Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks
Abstract— Traditionally, reliable multicast protocols are deterministic in nature. It is precisely this determinism that tends to become their limiting factor when aiming at reli...
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux