— Current service discovery protocols (SDP) hardly provide information on the actual availability of resources in the network or a mechanism for (device) resource reservation. Wh...
Archi Delphinanto, A. M. J. Koonen, Frank T. H. de...
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...