Sciweavers

332 search results - page 17 / 67
» Measuring performance impact of security protocols in wirele...
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 29 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 7 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
COMCOM
2008
138views more  COMCOM 2008»
13 years 7 months ago
MRP: Wireless mesh networks routing protocol
Wireless Mesh Networks (WMNs) are one of the few commonly implemented types of mobile ad-hoc networks (MANETs); several companies offer WMNs for broadband Internet access and for ...
Jangeun Jun, Mihail L. Sichitiu
GLOBECOM
2006
IEEE
14 years 1 months ago
Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks
— Sensing coverage is an important issue for sensor networks, since it is viewed as one of the critical measures of performance offered by a sensor network. The design of a routi...
Yuh-Ren Tsai
WINET
2010
129views more  WINET 2010»
13 years 6 months ago
Characterizing 802.11 wireless link behavior
Since wireless signals propagate through the ether, they are significantly affected by attenuation, fading, multipath, and interference. As a result, it is difficult to measure ...
Glenn Judd, Peter Steenkiste