Sciweavers

640 search results - page 108 / 128
» Securing Multicast Groups in Ad Hoc Networks
Sort
View
ACSC
2004
IEEE
14 years 10 days ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 10 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
WIMOB
2009
IEEE
14 years 3 months ago
Multipath Routing in MANETs Using Multiple Description Coding
—Routing in ad hoc networks is a well known issue. Most of the previous propositions to route data between two nodes aimed to define a path (sometimes several ones) on which pac...
Eddy Cizeron, Salima Hamma
PERCOM
2007
ACM
14 years 8 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
SPW
1999
Springer
14 years 26 days ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe