Sciweavers

2691 search results - page 376 / 539
» Security in Ad Hoc Networks
Sort
View
MOBIHOC
2003
ACM
14 years 10 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
MOBICOM
2006
ACM
14 years 4 months ago
SKVR: scalable knowledge-based routing architecture for public transport networks
Vehicular AdHoc Networks (VANET) can be treated as special kinds of Delay-tolerant Networks (DTN) where end-toend path might never be possible. As a result, mobile adhoc (MANET) r...
Shabbir Ahmed, Salil S. Kanhere
ACSC
2004
IEEE
14 years 2 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
CCS
2006
ACM
14 years 2 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
WD
2010
13 years 8 months ago
CAODV: Routing in mobile ad-hoc cognitive radio networks
This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...