Listing 1 - 10 of 335 | << page >> |
Sort by
|
Choose an application
Annotation The conference falls within the scope of wireless technologies, networks, applications and services.
Choose an application
Annotation MED HOC NET 2014 focuses on communication networking research, especially on new issues in Wireless Mesh and Ad Hoc Networks, which include Civil Security and Safety, Optimization and Control Schemes, Operation under Intermittent Connectivity, Green mechanisms, Location, Application Scenarios The scope of the workshop also includes new and exciting challenges in wireless mesh networks, sensor networks, vehicular networks, delay tolerant and opportunistic networks, and the opportunities provided from new paradigms.
Choose an application
WiOpt 2017 welcomes original papers related to modeling, performance evaluation, and optimization of wireless networks The scope covers all types of wireless networks cellular, ad hoc, content driven, delay tolerant, mesh, metropolitan, sensor, cognitive, vehicular, robotic, Internet of Things, virtualized, etc The focus is on issues at and above the MAC layer, although cross layer techniques encompassing the physical layer are equally welcome We encourage both theoretical contributions and submissions relating to real world empirical measurements, experimental studies.
Choose an application
Choose an application
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
Choose an application
Choose an application
Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.
Choose an application
Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2 TM , to end entities, that is, an actor that uses digital certificates to authorize application activities.
Choose an application
This book evaluates the ability of ad-hoc and cellular communication to enable cross-traffic assistance at intersections. Potential issues like Non-Line-Of-Sight (NLOS) reception with ad-hoc and limited capacity, higher latency and costs with cellular technology are investigated in two individual evaluations. A method for efficient information delivery via cellular systems and an inter-vehicle NLOS radio propagation model are proposed. Finally, the suitability of both technologies is compared.
Choose an application
Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2(TM), to end entities, that is, an actor that uses digital certificates to authorize application activities (Additional downloads for this standards can be found at https://standards.ieee.org/wp-content/uploads/2022/05/1609.2.1-2022_downloads.zip).
Listing 1 - 10 of 335 | << page >> |
Sort by
|