Sciweavers

2572 search results - page 491 / 515
» Identification in Ad Hoc Networks
Sort
View
NBIS
2009
Springer
15 years 8 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
GLOBECOM
2008
IEEE
15 years 8 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 8 months ago
Tuning Up the Performance of Constant-Time Distributed Scheduling Algorithms via Majorization
— Scheduling algorithms assign contention probability for each link in Wireless Ad Hoc Networks and plays a key role in deciding the system performance. Recently, many lowcost di...
Han Cai, Do Young Eun
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 8 months ago
On The Rate-Distance Adaptability of Slotted Aloha
—In wireless communication systems, the signal strength/quality generally varies with the distances between transmitters and receivers. As a consequence, the throughput in the MA...
Chih-Cheng Tseng, Shao-Yu Lien, Kwang-Cheng Chen, ...