4 pages matching WLAN in this book
Results 1-3 of 4
What people are saying - Write a review
We haven't found any reviews in the usual places.
An OnDemand Secure Routing Protocol Resilient to Byzantine Failures
Secure Wireless Gateway
3 other sections not shown
access control access point ad hoc networks adversary algorithm AODV attacks broadcasts captive portal certificate communication configuration connectivity control center cryptographic cryptosystems destination detection digital signatures ECDH ECDSA Elliptic Curve encryption false alarm fault Figure handshake hash chains hash function Hmac hoc networks hop count host identifier identity based IEEE IETF implementation improved system infrastructure intermediate node Internet IP address IPKG IPsec IPv6 Lomb malicious node mechanism mobile ad hoc Neighbor Discovery neighbor monitoring network layer node on-demand operation packet forwarding parameters path performance periodogram prefix private key probe problem public key random receives Redirect require response delay Router Router Discovery routing message routing protocols routing updates RREQ SAODV satellite scenarios scheme Section security solution sender sensor sequence number server SIAP signal processing simulation SLAP survivability techniques timer tion token topology traffic transmission verify wireless networks WLAN