Sciweavers

1557 search results - page 247 / 312
» Security and Cooperation in Wireless Networks
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 8 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 8 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
WISEC
2009
ACM
14 years 3 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 8 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
ICN
2009
Springer
14 years 1 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras