Sciweavers

10044 search results - page 108 / 2009
» Authentication in Wireless Networks
Sort
View
WCNC
2008
IEEE
15 years 5 months ago
Impact of MIMO Systems on CRRM in Heterogeneous Networks
António Serrador, Berend W. M. Kuipers, Lui...
ICWMC
2006
IEEE
15 years 5 months ago
Localized Tree Change Multicast Protocol for Mobile Ad Hoc Networks
T. Srinivasan, Chandrasekar Ramachandran, Vivek Vi...
WONS
2005
IEEE
15 years 4 months ago
Experiments of Some Performance Issues with IEEE 802.11b in Ad Hoc Networks
Claude Chaudet, Dominique Dhoutaut, Isabelle Gu&ea...
ADHOCNOW
2004
Springer
15 years 4 months ago
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
David Hwang, Bo-Cheng Lai, Ingrid Verbauwhede
ESORICS
2000
Springer
15 years 2 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer