Optimizing Cryptographically based Security in Wireless Networks.
Stuart JacobsPublished in: ICISSP (2015)
Keyphrases
- wireless networks
- network access
- wireless local area network
- wireless communication
- medium access control
- ad hoc networks
- mobile computing
- wired networks
- base station
- multi hop
- cellular networks
- wireless networking
- intrusion detection
- network security
- low bandwidth
- access control
- wireless transmission
- mobile wireless
- cross layer
- multimedia services
- access points
- link layer
- network coding
- key management
- wifi
- information security
- wireless technologies
- wireless ad hoc networks
- physical layer
- mobile networks
- heterogeneous wireless networks
- mobile ipv
- cognitive radio
- network traffic
- cloud computing