• 沒有找到結果。

[PDF] Top 20 New anonymous channel protocol in wireless communications

Has 10000 "New anonymous channel protocol in wireless communications" found on our website. Below are the top 20 most common "New anonymous channel protocol in wireless communications".

New anonymous channel protocol in wireless communications

New anonymous channel protocol in wireless communications

... al.’s protocol, we find that the effi- ciency of their protocol shows only in the ticket authen- tication ...al.’s protocol is reducing the cost in the ticket authentication phase, ... See full document

5

Anonymous channel and authentication in wireless communications

Anonymous channel and authentication in wireless communications

... Conclusion In this paper, we propose an efficient scheme for provid- ing an anonymous channel service in wireless communica- ...anonymity in our scheme is neither based on any ... See full document

10

NEW R&D TOOLS FOR WIRELESS COMMUNICATIONS

NEW R&D TOOLS FOR WIRELESS COMMUNICATIONS

... The third article, by Berger, Wang, Huang, and Zhou, is a tutorial on compressed sensing and its application to channel estimation. Compressed sensing is a recently coined term for a very useful mathematical ... See full document

1

Mutually Identity Authentications in GSM-based Anonymous Communications

Mutually Identity Authentications in GSM-based Anonymous Communications

... research in mutual authentications [19] and anonymous communications in the GSM system is to solve the subscriber’s problem of unwillingly leaking his/her identity in a wireless ... See full document

14

Quasi-static channel assignment algorithms for wireless communications networks

Quasi-static channel assignment algorithms for wireless communications networks

... the channel requirement constraints for individual cells (to have the call blocking probability of each cell no greater than a given performance ...problems. In the proposed solution procedure, a cost ... See full document

4

TOPICS IN WIRELESS COMMUNICATIONS

TOPICS IN WIRELESS COMMUNICATIONS

... advancements in MIMO tech- nologies in IEEE ...role in meeting the IMT-Advanced ...enable new types of links such as downlink multi-user ...available channel state infor- mation ... See full document

2

New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

... communication channel for confidentiality. Such protocols have been widely used in wired network for their simplicity and convenience, since users can choose easy-to-remember passwords without any assistant ... See full document

8

A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme

A MAC protocol for multi-channel multi-interface wireless mesh network using hybrid channel assignment scheme

... a new MAC protocol for multi-channel multi-interface ...Our protocol is based on a hybrid channel assignment strategy. In this strategy, each node is equipped with a fixed ... See full document

15

Release-time-based multi-channel MAC protocol for wireless mesh networks

Release-time-based multi-channel MAC protocol for wireless mesh networks

... are in normal situation which could be interrupted in some ...expires. In this case, the RTS will not be sent out by ...control channel of v was blocked by a NAV CTRL . In this case, ... See full document

20

Joint synchronization, channel length estimation, and channel estimation for the maximum likelihood sequence estimator for high speed wireless communications

Joint synchronization, channel length estimation, and channel estimation for the maximum likelihood sequence estimator for high speed wireless communications

... equivalent channel is first ...the channel estimate. Conventional channel estimation algorithms preset a fixed length for the ...For wireless communications, however, the actual length ... See full document

5

An Enhanced Medium Access Control Protocol for Multi-Channel Multi-Interface Wireless Mesh Networks

An Enhanced Medium Access Control Protocol for Multi-Channel Multi-Interface Wireless Mesh Networks

... Switchable Channel In order to reduce the number of channel switches, HMCP uses the same number of queues to map ...a new packet to be transmitted, it only has to insert the packet into the ... See full document

7

Handoff Ordering Using Signal Strength for Multimedia Communications in Wireless Networks

Handoff Ordering Using Signal Strength for Multimedia Communications in Wireless Networks

... waiting in the queue. The handoff requests waiting for the i bandwidth in the handoff queue are sorted continuously according to their ...working in one cell. As the figure shows, if there has no ... See full document

20

A Broadcast-VOD Protocol in an Integrated Wireless Mobile Network

A Broadcast-VOD Protocol in an Integrated Wireless Mobile Network

... a new mobile net- work model. In such new model, we investigate a fast broadcast-VOD problem in the new wireless ...isting wireless mobile networks are classified into ... See full document

8

Anonymous Authentication Scheme for Wireless Communications

Anonymous Authentication Scheme for Wireless Communications

... 摘要: Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular.. The exposur[r] ... See full document

1

Tracing Anonymous Mobile Attackers in Wireless Network

Tracing Anonymous Mobile Attackers in Wireless Network

... Abstract In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target’s computing ...attacks in a network environment, IP traceback methods are deployed to ... See full document

13

Multihop Cellular: A New Architecture for Wireless Communications

Multihop Cellular: A New Architecture for Wireless Communications

... This work ako applies the RTS/@TS (Request To Send / Clear To Send) access method of DCF (Distributed Coordina- tion Function) of E E E 802.1 1 191 MAC (Medium Access Con[r] ... See full document

10

A new authentication protocol based on pointer forwarding for mobile communications

A new authentication protocol based on pointer forwarding for mobile communications

... 摘要: A frequently moving mobile user in GSM must re-register at the HLR frequently, and, therefore, the signaling traffic is overhead and HLR database update cost raised. In this paper[r] ... See full document

1

A new authentication protocol based on pointer forwarding for mobile communications

A new authentication protocol based on pointer forwarding for mobile communications

... user in GSM must re-register at the HLR frequently, and, therefore, the signaling traffic is overhead and HLR database update cost ...raised. In this paper, the authors propose a new authentication ... See full document

2

The effect of channel estimator memory mismatch on the performance of MLSE in wireless data communications

The effect of channel estimator memory mismatch on the performance of MLSE in wireless data communications

... The wireless channel is modeled as a random time-invariant discrete-time equivalent channel with memory ν corrupted by the discrete-time complex AWGN samples with variance σ 2 ...random ... See full document

5

A New MAC Protocol for Supporting Differentiated QoS in IEEE 802.11 Multihop Wireless Networks

A New MAC Protocol for Supporting Differentiated QoS in IEEE 802.11 Multihop Wireless Networks

... transmits in vain and would retry next ...down. In the figure, if node A know the transmission on E->B is about to go and know the link E->B is conflict with ...terminal. In other side, if node F ... See full document

8

Show all 10000 documents...