<--- Back to Details
First PageDocument Content
Wireless networking / Internet / Computer networking / Network protocols / Ad hoc On-Demand Distance Vector Routing / Crowds / Multipath routing / Hop-by-hop transport / Onion routing / Routing / Computing / Network architecture
Date: 2007-05-24 10:16:06
Wireless networking
Internet
Computer networking
Network protocols
Ad hoc On-Demand Distance Vector Routing
Crowds
Multipath routing
Hop-by-hop transport
Onion routing
Routing
Computing
Network architecture

Privacy Preserving Communication in MANETs Heesook Choi, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering The Pennsylvania State University E-mail:{hchoi,mcdaniel,tlp}@cse.psu.edu Abstr

Add to Reading List

Source URL: www.cse.psu.edu

Download Document from Source Website

File Size: 303,73 KB

Share Document on Facebook

Similar Documents

The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1  Computer Science Department

The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1 Computer Science Department

DocID: 1uqsM - View Document

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks Yiting Liao and Jerry D. Gibson Department of Electrical and Computer Engineering University of Californi

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks Yiting Liao and Jerry D. Gibson Department of Electrical and Computer Engineering University of Californi

DocID: 1rCPw - View Document

FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks Abdul Kabbani Balajee Vamanan

FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks Abdul Kabbani Balajee Vamanan

DocID: 1rtxQ - View Document

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

DocID: 1rt8e - View Document

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC  2 ETH Zurich, Switzerland

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

DocID: 1raw5 - View Document