Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad hoc networks
biblio
"A clean slate design for secure wireless ad-hoc networks #x2014; Part 2: Open unsynchronized networks"
Submitted by grigby1 on Tue, 02/21/2017 - 11:55am
Ad hoc networks
Clocks
Games
min-max utility
Protocols
pubcrawl170103
Schedules
Synchronization
telecommunication security
Throughput
unsynchronized nodes
wireless ad-hoc networks security
cleanslate
biblio
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
Submitted by Anonymous on Mon, 12/07/2015 - 4:40pm
mobile ad hoc networks
telecommunication traffic
telecommunication security
secret verification message routing
Routing protocols
Routing
Public key
onion routing
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
AASR protocol
MANET
key-encrypted onion routing
fake routing packets
denial-of-service broadcasting
Cryptographic Protocols
authenticated routing
authenticated anonymous secure routing protocols
anonymous routing
adversarial environments
Ad hoc networks
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 1:47pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 1:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 1:21pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 8:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »