The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...
Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...