Abstract- The area of MANets is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad hoc manner. This paper presents the current research issues within the field of mobile ad-hoc networks (MANets) and highlights some of the problems and areas of future studies within MANets. The main focus is on the area of identity management (IM), context-awareness and user-centricity for MANets together with its security issues and implications. We conclude with the need of a research into t...
A mobile ad-hoc network (MANET) is a self-configuring network consists of mobile routers (included a...
In this paper, we discuss the mobile ad hoc Network:Security issues regarding attacks. Owe to the vu...
AbstractIdentity management provides PET (privacy enhancing technology) tools for users to control p...
The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but i...
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and ...
Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable...
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this su...
This paper takes a systematic approach to examining the basic concepts, the research issues and the ...
Abstract — In the modern world, mobile ad-hoc networks are consider as very popular research area. M...
This paper studies key management and security issues in mobile ad hoc networks (MANETs). Lack of st...
Mobile ad hoc networks (MANETs) has for several years been viewed as a promising technology for seve...
In this paper we review the state-of-the-art in Mobile Identity Management and discuss its implicati...
The growth of mobile business requires the ability to provide context-aware services when and where ...
Growth of mobile business requires the ability to provide context aware services when and where need...
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-config...
A mobile ad-hoc network (MANET) is a self-configuring network consists of mobile routers (included a...
In this paper, we discuss the mobile ad hoc Network:Security issues regarding attacks. Owe to the vu...
AbstractIdentity management provides PET (privacy enhancing technology) tools for users to control p...
The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but i...
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and ...
Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable...
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this su...
This paper takes a systematic approach to examining the basic concepts, the research issues and the ...
Abstract — In the modern world, mobile ad-hoc networks are consider as very popular research area. M...
This paper studies key management and security issues in mobile ad hoc networks (MANETs). Lack of st...
Mobile ad hoc networks (MANETs) has for several years been viewed as a promising technology for seve...
In this paper we review the state-of-the-art in Mobile Identity Management and discuss its implicati...
The growth of mobile business requires the ability to provide context-aware services when and where ...
Growth of mobile business requires the ability to provide context aware services when and where need...
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-config...
A mobile ad-hoc network (MANET) is a self-configuring network consists of mobile routers (included a...
In this paper, we discuss the mobile ad hoc Network:Security issues regarding attacks. Owe to the vu...
AbstractIdentity management provides PET (privacy enhancing technology) tools for users to control p...