Sciweavers

2691 search results - page 415 / 539
» Security in Ad Hoc Networks
Sort
View
ICCS
2001
Springer
14 years 2 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
MOBIHOC
2005
ACM
14 years 9 months ago
TCP over multihop 802.11 networks: issues and performance enhancement
Analyzing TCP operation over 802.11 multihop ad hoc networks involves a cross-layer study. In this work, we investigate the effect of congestion and MAC contention on the interact...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
MOBICOM
2006
ACM
14 years 4 months ago
Cooperative collision warning using dedicated short range wireless communications
The emergence of the 802.11a-based Dedicated Short Range Communications (DSRC) standard and advances in mobile ad hoc networking create ample opportunity for supporting delay-crit...
Tamer A. ElBatt, Siddhartha K. Goel, Gavin Holland...
TCOM
2010
168views more  TCOM 2010»
13 years 4 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
LCN
2008
IEEE
14 years 4 months ago
Understanding and using mobility on Publish/Subscribe based architectures for MANETs
Abstract—Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the...
Cristiano G. Rezende, Azzedine Boukerche, Bruno P....