Sciweavers

1482 search results - page 50 / 297
» Wireless LAN Security
Sort
View
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
13 years 11 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
ACISICIS
2005
IEEE
14 years 3 months ago
Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
ICC
1997
IEEE
327views Communications» more  ICC 1997»
14 years 2 months ago
A Method to Partially Suppress ISI and MAI for DS SS CDMA Wireless Networks
- We propose a method to partially suppress ISI and MAI for DS SS CDMA schemes in wireless LANs. The method can be regarded as an alternative approach to combat ISI and in particul...
Beata J. Wysocki, Tadeusz A. Wysocki
CCS
2010
ACM
13 years 10 months ago
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Secure "pairing" of wireless devices based on auxiliary or out-ofband (OOB)
Tzipora Halevi, Nitesh Saxena
IWNAS
2008
IEEE
14 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...