Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
— This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used ...
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...