3452 results in Wireless Communications
Index
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 479-485
-
- Chapter
- Export citation
4 - Naming and addressing
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 85-102
-
- Chapter
- Export citation
11 - Wireless operators in a shared spectrum
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 350-378
-
- Chapter
- Export citation
5 - Establishment of security associations
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 103-140
-
- Chapter
- Export citation
12 - Secure protocols for behavior enforcement
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 379-392
-
- Chapter
- Export citation
3 - Trust assumptions and adversary models
- from Part I - Introduction
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 74-82
-
- Chapter
- Export citation
8 - Privacy protection
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 237-272
-
- Chapter
- Export citation
9 - Selfish behavior at the MAC layer of CSMA/CA
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 275-330
-
- Chapter
- Export citation
Appendix A - Introduction to cryptographic algorithms and protocols
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 393-422
-
- Chapter
- Export citation
7 - Secure routing in multi-hop wireless networks
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 169-236
-
- Chapter
- Export citation
Preface
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp xi-xv
-
- Chapter
- Export citation
Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 83-84
-
- Chapter
- Export citation
Part I - Introduction
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 1-2
-
- Chapter
- Export citation
2 - Upcoming wireless networks and new challenges
- from Part I - Introduction
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 33-73
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp i-vi
-
- Chapter
- Export citation
Chapter 37 - The Path to 4G and the Mobilization of the Internet
- from Part XIV - Public Wireless Broadband
-
-
- Book:
- Emerging Technologies in Wireless LANs
- Published online:
- 10 December 2009
- Print publication:
- 05 November 2007, pp 805-822
-
- Chapter
- Export citation
Chapter 20 - Coexistence of Unlicensed Wireless Networks
- from Part VII - Coexistence
-
-
- Book:
- Emerging Technologies in Wireless LANs
- Published online:
- 10 December 2009
- Print publication:
- 05 November 2007, pp 469-500
-
- Chapter
- Export citation
Chapter 23 - Cognitive WLAN: A Better Architecture
- from Part VIII - 802.11 Network and Radio Resource Management
-
-
- Book:
- Emerging Technologies in Wireless LANs
- Published online:
- 10 December 2009
- Print publication:
- 05 November 2007, pp 523-534
-
- Chapter
- Export citation
Part XI - Wi-Fi Hotspots
-
- Book:
- Emerging Technologies in Wireless LANs
- Published online:
- 10 December 2009
- Print publication:
- 05 November 2007, pp -
-
- Chapter
- Export citation
Chapter 28 - Hot Spots: Public Access using 802.11
- from Part XI - Wi-Fi Hotspots
-
-
- Book:
- Emerging Technologies in Wireless LANs
- Published online:
- 10 December 2009
- Print publication:
- 05 November 2007, pp 609-624
-
- Chapter
- Export citation