• Aucun résultat trouvé

[PDF] Top 20 Authentication services in mobile ad hoc networks

Has 10000 "Authentication services in mobile ad hoc networks" found on our website. Below are the top 20 most common "Authentication services in mobile ad hoc networks".

Authentication services in mobile ad hoc networks

Authentication services in mobile ad hoc networks

... some ad hoc scenarios, they might know each other, so they can establish trusted ...done in this field to find security solutions for MANETs deployments; one of them proposes a framework where the ... Voir le document complet

42

Service Provision in Disconnected Mobile Ad Hoc Networks

Service Provision in Disconnected Mobile Ad Hoc Networks

... issues in ad hoc ...of services in wireless single-hop ad hoc ...wireless ad hoc networks. Like in DEAPspace, each device in Konark ... Voir le document complet

7

Authentication and consensus overhead in vehicular ad hoc networks

Authentication and consensus overhead in vehicular ad hoc networks

... vehicular ad hoc networks is based on the ECDSA algorithm for supporting authentication mecha- ...applications. In this paper, we inves- tigate the total overhead of ECDSA, combining ... Voir le document complet

15

Routing in Large Scale tactical mobile ad hoc Networks

Routing in Large Scale tactical mobile ad hoc Networks

... military networks that is currently occurring with the ad- vent of the Network Centric Warfare adopts the concept of “Mobile Ad Hoc Network” (MANET) as a central component of the ... Voir le document complet

204

Authentication and consensus overhead in vehicular ad hoc networks

Authentication and consensus overhead in vehicular ad hoc networks

... Authentication and consensus overhead in vehicular ad hoc networks Jonathan Petit · Zoubir Mammeri Abstract Vehicular ad hoc networks aim at increasing pas- senger ... Voir le document complet

16

Opportunistic Software Deployment in Disconnected Mobile Ad Hoc Networks

Opportunistic Software Deployment in Disconnected Mobile Ad Hoc Networks

... applications in disconnected ...addressed in many projects and following dif- ferent lines in the past few ...servers in the case of Maven) maintains a repository where applications can be ... Voir le document complet

24

Stability Oriented Routing in Mobile Ad Hoc Networks Based on Simple Automatons

Stability Oriented Routing in Mobile Ad Hoc Networks Based on Simple Automatons

... wireless ad-hoc networks with mobile nodes have not stable topology, the classical network functions such as the routing are difficult to ...transmission in multihop ad hoc ... Voir le document complet

29

Virtual mobility to improve cooperation in mobile ad hoc networks

Virtual mobility to improve cooperation in mobile ad hoc networks

... for mobile ad hoc networks use the principle of the shortest ...behaviour in reaction to events suffered. In the first case, the node adopts a negative behaviour and its presence ... Voir le document complet

6

Scalability and Quality of Service in Mobile Ad Hoc Networks

Scalability and Quality of Service in Mobile Ad Hoc Networks

... table in every cluster ...highly mobile ad hoc ...concerns in this ...time in every nearby ...status. In the initial clustering stage a node joins a cluster that can ... Voir le document complet

182

Quality of service support and topology control in mobile ad hoc networks

Quality of service support and topology control in mobile ad hoc networks

... differentiation in wireless ad hoc networks (SWAN) SWAN [5] est un modèle réseau sans état basé sur des algorithmes de contrôle distribués dans le but d’assurer une différenciation de ... Voir le document complet

151

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks

... communication in disconnected, partially connected, or intermittently connected mobile ad hoc net- ...ing in ”delay-tolerant networks” [6, 9], while others rather consider the ... Voir le document complet

5

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

... ORKS In this paper, we analyzed the runtime resulting from the authentication of a joining node by a distributed AAA framework within a mobile ad-hoc ... Voir le document complet

6

Surrogate-Assisted Optimisation of Composite Applications in Mobile Ad hoc Networks

Surrogate-Assisted Optimisation of Composite Applications in Mobile Ad hoc Networks

... Infrastructure-less mobile ad hoc networks enable the de- velopment of collaborative pervasive ...dynamic networks, collaboration between devices can be realised through ... Voir le document complet

9

Opportunistic Content-Based Dissemination in Disconnected Mobile Ad Hoc Networks

Opportunistic Content-Based Dissemination in Disconnected Mobile Ad Hoc Networks

... designed in the last few years in order to support destination-driven routing in dis- connected MANETs [5, ...6]. In contrast content-based com- munication in such networks has ... Voir le document complet

7

Relaying in Mobile Ad Hoc Networks: The Brownian Motion Mobility Model

Relaying in Mobile Ad Hoc Networks: The Brownian Motion Mobility Model

... Unité de recherche INRIA Sophia Antipolis 2004, route des Lucioles - BP 93 - 06902 Sophia Antipolis Cedex France Unité de recherche INRIA Futurs : Parc Club Orsay Université - ZAC des Vi[r] ... Voir le document complet

23

Route Lifetime based Interactive Routing in Intervehicle Mobile Ad Hoc Networks

Route Lifetime based Interactive Routing in Intervehicle Mobile Ad Hoc Networks

... for ad hoc networks ...approach in which each node maintains one or more tables that contain routing information to every other node in the ...Changes in network topology result ... Voir le document complet

24

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

... Conclusion In this paper we have presented a new protocol for content-based communication in disconnected ...between mobile hosts that get close enough to one another, allowing these hosts to ex- ... Voir le document complet

9

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

... sender. In contrast in content-based communication the sender does not nec- essarily know who the recipients of its message are, or even if they exist at ...used in stable, wired networks, or ... Voir le document complet

33

Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures

Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures

... free. In the presence of malicious nodes, different strategies have been proposed to detect and suppress the invalid recommendations that can be generated during the propagation ...process. In [7], [8], a ... Voir le document complet

9

Advanced receivers for distributed cooperation in mobile ad hoc networks

Advanced receivers for distributed cooperation in mobile ad hoc networks

... residual networks [ He+16 ...issue. In this case W ♣sq is forced to be a Toeplitz matrix, and the number of parameters to be trained is significantly ...delays in the ob- served ...role in the ... Voir le document complet

332

Show all 10000 documents...