Sciweavers

112 search results - page 10 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
76
Voted
ENTCS
2006
173views more  ENTCS 2006»
14 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
76
Voted
CONEXT
2008
ACM
14 years 11 months ago
TDM MAC protocol design and implementation for wireless mesh networks
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multihop wireless mesh networks using a programmable wireless platform. E...
Dimitrios Koutsonikolas, Theodoros Salonidis, Henr...
WISA
2009
Springer
15 years 4 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Optimal Power Allocation for Amplify-And-Forward Relay Networks via Conic Programming
— Relay power allocation has been shown to provide substantial performance gain in wireless relay channels when perfect global channel state information (CSI) is available. In th...
Tony Q. S. Quek, Moe Z. Win, Hyundong Shin, Marco ...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay