Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile nodes
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
mobile computing
telecommunication security
security
Resiliency
resilience
pubcrawl
policy based security
policy based approach
ns 2
mobile nodes
authorization
mobile ad hoc networks
mobile ad hoc network
Metrics
messages dissemination
MANETs
manet privacy
data privacy
Compositionality
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
mobile nodes
Throughput
threshold-based black hole attack prevention method
telecommunication security
security attack
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile radio
AODV
mobile ad hoc networks
mobile ad hoc network
Metrics
manet privacy
MANET
malicious node
IP networks
fake routing information
data packets
Compositionality
Black hole attack
biblio
Content Retrieval while Moving Across IP and NDN Network Architectures
Submitted by aekwall on Tue, 09/08/2020 - 9:16am
content retrieval
policy governance
clean slate
NDN network architectures
mobility scenario
IP network architectures
inter-network architecture mobility framework
heterogeneous Future Internet
content-based retrieval
IP networks
access networks
mobile nodes
mobility management (mobile radio)
internet
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
« first
‹ previous
1
2
3
4
next ›
last »