Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Abstract. Today’s computer network is shifting from wired networks to wireless networks. Several attempts have been made to assess the performance of TCP over wireless networks. ...
—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...
Abstract. Conventional TCP in wireless environment has a lack of ability to differentiate the packet losses caused by network congestion from those caused by wireless link error. ...