Sciweavers

2691 search results - page 465 / 539
» Security in Ad Hoc Networks
Sort
View
EUROCRYPT
2007
Springer
14 years 4 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
CNSR
2007
IEEE
14 years 4 months ago
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
IWSOS
2009
Springer
14 years 4 months ago
A Self-organizing Approach to Activity Recognition with Wireless Sensors
Abstract. In this paper, we describe an approach to activity recognition, which is based on a self-organizing, ad hoc network of body-worn sensors. It makes best use of the availab...
Clemens Holzmann, Michael Haslgrübler
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 4 months ago
Decentralized Interference Aware Link Adaptation Using Busy Bursts
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...
VTC
2007
IEEE
14 years 4 months ago
Interference Tolerance Signaling Using TDD Busy Tone Concept
Abstract—This paper presents a fully decentralized link adaptation algorithm to manage interference in an ad hoc network operating in TDD mode. The algorithm, called busy tone in...
Patrick Agyapong, Harald Haas, Alexander Tyrrell, ...