| Document Date: 2010-02-05 14:49:04 Open Document File Size: 226,91 KBShare Result on Facebook
City Tucson / / Company TCP ACKs / AES / I. I NTRODUCTION Wireless / McGraw-Hill Companies / / / Facility Computer Engineering University of Arizona / Prentice Hall / / IndustryTerm jam communications / wireless channel / online key distribution center / zero-knowledge protocols / wireless denial / ordinary block encryption algorithm / Secure communications / lower energy cost / conventional symmetric algorithm / multi-hop wireless route / invertible pre-processing step / brute force search attacks / ad hoc networking / magnitude less energy / ad hoc networks / Energy-efficient link-layer jamming attacks / power management / spread spectrum communications / Law et / wireless network / Spread spectrum communications handbook / wireless systems / obvious solution / multi-hop wireless networks / encryption algorithms / wireless network security / virtual carrier sensing / wireless transmissions / wireless links / computing / wireless medium / Wireless security / data wireless / Wireless Networks / randomized frequency hopping algorithm / energy / / OperatingSystem DoS / / Organization National Science Foundation / University of Arizona / ON TCP / / Person E. Altman / P. Nain / A. Al Hanbali / / ProvinceOrState Arizona / / PublishedMedium Lecture Notes in Computer Science / / Technology encryption / symmetric key encryption / Cryptography / full-duplex / randomized frequency hopping algorithm / one symmetric encryption / WSN MAC protocols / encryption algorithms / All-or-nothing encryption / frequency hopping / Mobile Computing / conventional symmetric algorithm / zero-knowledge protocols / html / block encryption / ordinary block encryption algorithm / network protocols / / URL http /
SocialTag |