Sciweavers

332 search results - page 61 / 67
» Measuring performance impact of security protocols in wirele...
Sort
View
ACSW
2006
13 years 9 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
PDIS
1994
IEEE
13 years 11 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 29 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...