The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Abstract— Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and henc...