Wireless networking

Results: 11409



#Item
821Session R2G  Integrating CASA ERC Wireless Networking Research into Education  Byron Wallace1, Wayne Burleson2 , Brian Donovan3, Jim Kurose4, Irene Ros5, and Michael Zink6

Session R2G Integrating CASA ERC Wireless Networking Research into Education Byron Wallace1, Wayne Burleson2 , Brian Donovan3, Jim Kurose4, Irene Ros5, and Michael Zink6

Add to Reading List

Source URL: www.ireneros.com

Language: English - Date: 2015-06-02 16:00:54
    822Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

    Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

    Add to Reading List

    Source URL: youbroketheinternet.org

    Language: English - Date: 2015-09-29 18:17:30
    823KARMABOOTY Anthony Bolan & Chris Cox University of Nebraska - Omaha NEbraskaCERT CSF February 2014  WiFi Pineapple

    KARMABOOTY Anthony Bolan & Chris Cox University of Nebraska - Omaha NEbraskaCERT CSF February 2014 WiFi Pineapple

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2015-06-21 14:34:04
    824Workshop on IEEE Vehicular Networking and Applications Workshop - Future Wireless Technologies for Vehicle Infrastructure Integration (VII) Applications (VehiMobil 2009), co-located with IEEE ICC 2009, Dresden, Germany,

    Workshop on IEEE Vehicular Networking and Applications Workshop - Future Wireless Technologies for Vehicle Infrastructure Integration (VII) Applications (VehiMobil 2009), co-located with IEEE ICC 2009, Dresden, Germany,

    Add to Reading List

    Source URL: www.research2standards.net

    Language: English
      825IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 3, JUNEAlgorithms for Wireless Capacity Olga Goussevskaia, Magnús M. Halldórsson, and Roger Wattenhofer

      IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 3, JUNEAlgorithms for Wireless Capacity Olga Goussevskaia, Magnús M. Halldórsson, and Roger Wattenhofer

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:03
        826Case Study: Networking Solutions  The security is superior as compare to other Antivirus Mr. Lohith T (System Admin - Convergent Wireless Communications Pvt. Ltd)

        Case Study: Networking Solutions The security is superior as compare to other Antivirus Mr. Lohith T (System Admin - Convergent Wireless Communications Pvt. Ltd)

        Add to Reading List

        Source URL: www.esetnod32.in

        Language: English
          8271  Vampire attacks: Draining life from wireless ad-hoc sensor networks Eugene Y. Vasserman∗ Kansas State University

          1 Vampire attacks: Draining life from wireless ad-hoc sensor networks Eugene Y. Vasserman∗ Kansas State University

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2012-04-20 11:50:45
          828

          PDF Document

          Add to Reading List

          Source URL: db.csail.mit.edu

          Language: English - Date: 2005-06-30 21:51:14
          829

          PDF Document

          Add to Reading List

          Source URL: www.nebraskacert.org

          Language: English - Date: 2015-06-21 14:34:41
          830

          PDF Document

          Add to Reading List

          Source URL: www.winlab.rutgers.edu

          Language: English - Date: 2015-05-27 13:11:59