Sciweavers

583 search results - page 4 / 117
» On Cooperative Wireless Network Secrecy
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 1 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
WISA
2009
Springer
15 years 4 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
WCNC
2008
IEEE
15 years 4 months ago
Cooperative Processing for the WLAN Uplink
Marc Kuhn, Jörg Wagner, Armin Wittneben
84
Voted
ICC
2009
IEEE
101views Communications» more  ICC 2009»
15 years 4 months ago
Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks
Abstract—In wireless networks, the broadcast nature of wireless transmission enables cooperation by sharing the same transmissions with nearby receivers and thus can help improve...
Zhengguo Sheng, Zhiguo Ding, Kin K. Leung
ADHOCNOW
2008
Springer
14 years 10 months ago
A Lower Bound on the Capacity of Wireless Ad Hoc Networks with Cooperating Nodes
In this paper, we consider the effects on network capacity when the nodes of an ad hoc network are allowed to cooperate. These results are then compared to the theoretical upper b...
Anthony S. Acampora, Louisa Pui Sum Ip