: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...