The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the shortage of energetic resources in mobile devices. Leg...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
Modern high speed interconnects such as Myrinet and Gigabit Ethernet have shifted the bottleneck in communication from the interconnect to the messaging software at the sending an...
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...