Sciweavers

300 search results - page 27 / 60
» Designing a Practical Access Point Association Protocol
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
GLOBECOM
2008
IEEE
14 years 2 months ago
A Low-Signalling Scheme for Distributed Resource Allocation in Multi-Cellular OFDMA Systems
—This paper considers distributed protocol design for joint sub-carrier, transmission scheduling and power management in uplink/downlink multi-cellular OFDMA wireless networks. T...
Pablo Soldati, Mikael Johansson
VTC
2006
IEEE
14 years 1 months ago
SNMP-Based Approach to Load Distribution in IEEE 802.11 Networks
Abstract— In an IEEE 802.11 network, the traffic load collectively given by wireless stations (WSs) is usually not fairly shared by all available access points (APs), as WSs ind...
Li-Hsing Yen, Tse-Tsung Yeh
NDSS
1998
IEEE
14 years 2 days ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young
MOBIHOC
2010
ACM
13 years 5 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling