Listing 1 - 10 of 303 | << page >> |
Sort by
|
Choose an application
Annotation The conference falls within the scope of wireless technologies, networks, applications and services.
Choose an application
Annotation MED HOC NET 2014 focuses on communication networking research, especially on new issues in Wireless Mesh and Ad Hoc Networks, which include Civil Security and Safety, Optimization and Control Schemes, Operation under Intermittent Connectivity, Green mechanisms, Location, Application Scenarios The scope of the workshop also includes new and exciting challenges in wireless mesh networks, sensor networks, vehicular networks, delay tolerant and opportunistic networks, and the opportunities provided from new paradigms.
Choose an application
WiOpt 2017 welcomes original papers related to modeling, performance evaluation, and optimization of wireless networks The scope covers all types of wireless networks cellular, ad hoc, content driven, delay tolerant, mesh, metropolitan, sensor, cognitive, vehicular, robotic, Internet of Things, virtualized, etc The focus is on issues at and above the MAC layer, although cross layer techniques encompassing the physical layer are equally welcome We encourage both theoretical contributions and submissions relating to real world empirical measurements, experimental studies.
Choose an application
Choose an application
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
Choose an application
Choose an application
Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.
Choose an application
Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2 TM , to end entities, that is, an actor that uses digital certificates to authorize application activities.
Choose an application
Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2(TM), to end entities, that is, an actor that uses digital certificates to authorize application activities (Additional downloads for this standards can be found at https://standards.ieee.org/wp-content/uploads/2022/05/1609.2.1-2022_downloads.zip).
Choose an application
"This book tackles the prevalent research challenges that hinder a fully deployable vehicular network, presenting a unified treatment of the various aspects of VANETs and is essential for not only university professors, but also for researchers working in the automobile industry"--Provided by publisher.
Listing 1 - 10 of 303 | << page >> |
Sort by
|