๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

On digital signatures in ad hoc networks

โœ Scribed by Westhoff, D. ;Lamparter, B. ;Paar, C. ;Weimerskirch, A.


Publisher
John Wiley and Sons
Year
2005
Tongue
English
Weight
298 KB
Volume
16
Category
Article
ISSN
1124-318X

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Advances in Ad Hoc Networks (I)
โœ Jun Zheng; Shiwen Mao; Scott F. Midkiff; Tommaso Melodia ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 187 KB

Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise to enable a broad range of civilian, commercial, and military applications. These networks were originally envisioned as collections of autonomous mobile or stationary nodes that dynamically auto-configure

Preemptive routing in ad hoc networks
โœ Tom Goff; Nael Abu-Ghazaleh; Dhananjay Phatak; Ridvan Kahvecioglu ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 458 KB

Routing in ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken. Existing on-demand ad hoc routing algorithms initiate route discovery only after a path breaks, incurring a significant cost in detecting the disconnection and establishi

Flooding in wireless ad hoc networks
โœ H Lim; C Kim ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 265 KB

In an ad hoc network, each host assumes the role of a router and relays packets toward ยฎnal destinations. This paper studies efยฎcient routing mechanisms for packet ยฏooding in ad hoc wireless networks. Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network

Key agreement in ad hoc networks
โœ N Asokan; P Ginzboorg ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 284 KB

We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th