Transmission power control has been used in wireless networks to improve the channel reuse and/or reduce energy consumption. It has been mainly applied to single-input single-outp...
Mohammad Z. Siam, Marwan Krunz, Shuguang Cui, Alaa...
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority ...