Sciweavers

442 search results - page 45 / 89
» An Energy-Conserving Access Protocol for Wireless Communicat...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
INFOCOM
2010
IEEE
13 years 6 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
INFOCOM
2002
IEEE
14 years 29 days ago
Multicast Scheduling for List Requests
—Advances in wireless and optical communication, as well as in Internet multicast protocols, make broadcast and multicast methods an effective solution to disseminate data. In pa...
Vincenzo Liberatore
VTC
2007
IEEE
116views Communications» more  VTC 2007»
14 years 2 months ago
Applicability of a Multi-Mode MAC Protocol
— Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots i...
Arif Otyakmaz, Ismet Aktas, Marc Schinnenburg, Ral...
MOBICOM
1999
ACM
14 years 10 days ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins