Sciweavers

10044 search results - page 151 / 2009
» Authentication in Wireless Networks
Sort
View
IJWMC
2006
112views more  IJWMC 2006»
14 years 11 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
VTC
2007
IEEE
15 years 6 months ago
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop
— In this paper, we present an analysis of various multicast schemes over IEEE 802.11 Multi-hop. Analyzing performance of wireless multicasting communication is important because...
Yong Ho Kim, Nan Sol Seo, Young Yong Kim
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 5 months ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
ICDCSW
2002
IEEE
15 years 4 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 6 months ago
Evolution of Radio Resource Management: A Case for Cognitive Resource Manager with VPI
— The cognitive radio and cognitive wireless networks paradigms are interesting candidates for the next generation self-organizing and self-reconfigurable wireless networks. In ...
Marina Petrova, Petri Mähönen, Janne Rii...