A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols.
Yu ChengXinhua LingWeihua ZhuangPublished in: INFOCOM (2009)
Keyphrases
- cryptographic protocols
- dynamic programming
- multiple access
- communication protocol
- communication protocols
- cellular automata
- network protocols
- security protocols
- voting protocols
- authentication protocol
- sufficiently small
- locking protocol
- multi party non repudiation
- key distribution
- medium access control
- protocol specification
- trusted third party
- distributed databases