Sciweavers

2691 search results - page 423 / 539
» Security in Ad Hoc Networks
Sort
View
KBSE
2005
IEEE
14 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ENTCS
2006
180views more  ENTCS 2006»
13 years 10 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
JSAC
2011
142views more  JSAC 2011»
13 years 5 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
INFOCOM
2009
IEEE
14 years 4 months ago
To Cache or Not To Cache?
—We address cooperative caching in mobile ad hoc networks where information is exchanged in a peer-to-peer fashion among the network nodes. Our objective is to devise a fully-dis...
Marco Fiore, Francesco Mininni, Claudio Casetti, C...
SASO
2008
IEEE
14 years 4 months ago
On a Self-Organizing MANET Event Routing Architecture with Causal Dependency Awareness
Publish/subscribe (P/S) is a communication paradigm of growing popularity for information dissemination in largescale distributed systems. The strong decoupling between informatio...
Guanhong Pei, Binoy Ravindran, E. Douglas Jensen