In ad hoc networks there is a need for all-to-one protocols that allow for information collection or ''sensing'' of the state of an ad hoc network and the nodes that comprise it. Such protocols may be used for service discovery, auto-configuration, network management, topology discovery or reliable
โฆ LIBER โฆ
Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks
โ Scribed by Chigan, C.; Li, L.; Ye, Y.
- Book ID
- 114443599
- Publisher
- The Institution of Engineering and Technology
- Year
- 2007
- Tongue
- English
- Weight
- 407 KB
- Volume
- 1
- Category
- Article
- ISSN
- 1751-8709
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
An optimised resource aware approach to
โ
Justin Lipman; Mehran Abolhasan; Paul Boustead; Joe Chicharo
๐
Article
๐
2005
๐
Elsevier Science
๐
English
โ 373 KB
Computationally secure self-healing key
โ
Ratna Dutta; Sourav Mukhopadhyay; Martin Collier
๐
Article
๐
2010
๐
Elsevier Science
๐
English
โ 508 KB
This paper introduces a novel self-healing technique for key distribution with revocation and demonstrates how it improves the efficiency over the previous approaches while using the existing idea of secret sharing or revocation polynomial in designing self-healing key distribution schemes with revo
A quality of service aware cross-layer a
โ
J.C. Mundarath; P. Ramanathan; B.D. Van Veen
๐
Article
๐
2009
๐
Elsevier Science
๐
English
โ 266 KB
ACAR: Adaptive Connectivity Aware Routin
โ
Qing Yang; Alvin Lim; Shuang Li; Jian Fang; Prathima Agrawal
๐
Article
๐
2009
๐
Springer US
๐
English
โ 974 KB
Distributed resource management and admi
โ
Zhao, H.; Garcia-Palacios, E.; Wei, J.; Wang, S.; Ma, D.
๐
Article
๐
2012
๐
The Institution of Engineering and Technology
๐
English
โ 606 KB
Game theoretic approach in routing proto
โ
Mohammad Naserian; Kemal Tepe
๐
Article
๐
2009
๐
Elsevier Science
๐
English
โ 634 KB