In this paper, we analyze a wireless LAN hot-spot, based on the IEEE 802.11b protocol, and more specifically we address the issue of defining proper pricing strategies, from bot...
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Significant research effort has been directed towards the design and performance analysis of imperfect scheduling policies for wireless networks. These imperfect schedulers are o...
Analysis of the drafi IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard’s ad hoc and infrastructure netw...
Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Pres...
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...