Sciweavers

1557 search results - page 24 / 312
» Security and Cooperation in Wireless Networks
Sort
View
TWC
2008
120views more  TWC 2008»
14 years 9 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu
AINA
2004
IEEE
15 years 1 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
WCNC
2008
IEEE
15 years 3 months ago
Cooperative Transmission in a Wireless Cluster Based on Flow Management
—In this paper, a cooperative transmission design for a multi-node wireless cluster network is presented. It is assumed that the nodes operate in half-duplex mode and that channe...
Debdeep Chatterjee, Tan F. Wong, Tat M. Lok
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ISPEC
2009
Springer
15 years 4 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...