On digital signatures in ad hoc networks
โ Scribed by Westhoff, D. ;Lamparter, B. ;Paar, C. ;Weimerskirch, A.
- Publisher
- John Wiley and Sons
- Year
- 2005
- Tongue
- English
- Weight
- 298 KB
- Volume
- 16
- Category
- Article
- ISSN
- 1124-318X
- DOI
- 10.1002/ett.1061
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise to enable a broad range of civilian, commercial, and military applications. These networks were originally envisioned as collections of autonomous mobile or stationary nodes that dynamically auto-configure
Routing in ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken. Existing on-demand ad hoc routing algorithms initiate route discovery only after a path breaks, incurring a significant cost in detecting the disconnection and establishi
In an ad hoc network, each host assumes the role of a router and relays packets toward ยฎnal destinations. This paper studies efยฎcient routing mechanisms for packet ยฏooding in ad hoc wireless networks. Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network
We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th