Sciweavers

422 search results - page 58 / 85
» Protocol Specialization
Sort
View
111
Voted
ICCCN
2008
IEEE
15 years 10 months ago
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 s...
Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai...
129
Voted
SECON
2008
IEEE
15 years 10 months ago
Decentralized Tick Synchronization for Multi-Hop Medium Slotting in Wireless Ad Hoc Networks Using Black Bursts
—In this paper, we present Black Burst Synchronization (BBS)1 , a novel protocol for decentralized network-wide tick synchronization in wireless ad hoc networks, located at MAC l...
Reinhard Gotzhein, Thomas Kuhn
130
Voted
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
133
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 10 months ago
Achievable Diversity-Multiplexing-Delay Tradeoff for ARQ Cooperative Broadcast Channels
—Cooperative broadcast aims to deliver common messages to all receiver nodes in the wireless network by utilizing cooperation between them. This can have many important applicati...
Lingfan Weng, Ross D. Murch
130
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 10 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana