Sciweavers

7329 search results - page 127 / 1466
» Network Extractor Protocols
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TMC
2012
13 years 5 months ago
The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks
—We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure ...
Tingting Sun, Bin Zan, Yanyong Zhang, Marco Grutes...
JSAC
2006
106views more  JSAC 2006»
15 years 3 months ago
Mathematical Decomposition Techniques for Distributed Cross-Layer Optimization of Data Networks
Abstract--Network performance can be increased if the traditionally separated network layers are jointly optimized. Recently, network utility maximization has emerged as a powerful...
Björn Johansson, Pablo Soldati, Mikael Johans...
COMCOM
2007
168views more  COMCOM 2007»
15 years 3 months ago
An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks
—In Ad Hoc networking, cluster-based communication protocol can reduce large amount of flooding packets in route establishment process. However, the 802.11 medium access control ...
Gwo-Jong Yu, Chih-Yung Chang
GLOBECOM
2008
IEEE
15 years 9 months ago
MACA-U: A Media Access Protocol for Underwater Acoustic Networks
—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani