Sciweavers

547 search results - page 61 / 110
» Analysis of a mobile communication security protocol
Sort
View
134
Voted
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 3 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
WIMOB
2007
IEEE
15 years 8 months ago
The Analysis of the Optimal Periodic Ranging Slot Number in IEEE 802.16 OFDMA Systems
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
Jihua Zhou, Xin Jin, Jiangtao Dong, Jinglin Shi, Z...
IWCMC
2009
ACM
15 years 8 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
CCS
2009
ACM
15 years 8 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
INFOCOM
2003
IEEE
15 years 7 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu