Sciweavers

640 search results - page 102 / 128
» Securing Multicast Groups in Ad Hoc Networks
Sort
View
CCS
2008
ACM
13 years 10 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ECUMN
2007
Springer
14 years 2 months ago
Modeling and Analysis of Energy Consumption in IEEE802.11e Networks
Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE802.11 Infrastructure mode, or for all the users as in IEEE802.11 ad hoc mo...
Olfa Bouattay, Tijani Chahed, Mounir Frikha, Sami ...
MOBIHOC
2009
ACM
14 years 9 months ago
MotionCast: on the capacity and delay tradeoffs
In this paper, we define multicast for ad hoc network through nodes' mobility as MotionCast, and study the capacity and delay tradeoffs for it. Assuming nodes move according ...
Chenhui Hu, Xinbing Wang, Feng Wu
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
14 years 2 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
TPDS
2008
133views more  TPDS 2008»
13 years 8 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu