Works matching DE "ACCESS control of ad hoc networks"
Results: 21
Adaptive multichannel MAC protocol based on SD-TDMA mechanism for the vehicular ad hoc network.
- Published in:
- IET Communications (Wiley-Blackwell), 2018, v. 12, n. 12, p. 1509, doi. 10.1049/iet-com.2017.1072
- By:
- Publication type:
- Article
A Low Duty Cycle Efficient MAC Protocol Based on Self-Adaption and Predictive Strategy.
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 4, p. 828, doi. 10.1007/s11036-017-0878-x
- By:
- Publication type:
- Article
A Store-and-Forward Cooperative MAC for Wireless Ad Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2016, v. 21, n. 6, p. 1024, doi. 10.1007/s11036-016-0736-2
- By:
- Publication type:
- Article
A Semantics-based Approach to Large-Scale Mobile Social Networking.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 2, p. 192, doi. 10.1007/s11036-011-0330-6
- By:
- Publication type:
- Article
Energy Efficient and Scalable Routing Protocol for Extreme Emergency Ad Hoc Communications.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 2, p. 312, doi. 10.1007/s11036-011-0336-0
- By:
- Publication type:
- Article
Energy- and Delay-Efficient Routing in Mobile Ad Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 2, p. 281, doi. 10.1007/s11036-011-0335-1
- By:
- Publication type:
- Article
A Lightweight Batch Anonymous Authentication Scheme for VANET Based on Pairing-free.
- Published in:
- Computer Science & Information Systems, 2018, v. 15, n. 3, p. 549, doi. 10.2298/CSIS171222022S
- By:
- Publication type:
- Article
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3094, doi. 10.1002/sec.1234
- By:
- Publication type:
- Article
A Review on Routing Protocols used in VANET.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 6, p. 281
- By:
- Publication type:
- Article
TTSASA: Three Tier Security against Sybil Attack.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 1, p. 62
- By:
- Publication type:
- Article
System throughput improvement by optimizing timeout for wireless network coding and frame aggregation on CSMA/CA bidirectional two-hop relaying prototype.
- Published in:
- IEEJ Transactions on Electrical & Electronic Engineering, 2016, v. 11, p. S115, doi. 10.1002/tee.22244
- By:
- Publication type:
- Article
A new method for complexity determination to be used in new hyper-hybrid AD HOC cloud computing.
- Published in:
- Electrotechnical Review / Elektrotehniski Vestnik, 2017, v. 84, n. 1/2, p. 24
- By:
- Publication type:
- Article
A NEW AUTHENTICATION SCHEME FOR SIP REGISTRATION IN A MANET ENVIRONMENT.
- Published in:
- International Journal of Computer Science & Applications, 2015, v. 12, n. 1, p. 134
- By:
- Publication type:
- Article
Vehicle authentication via monolithically certified public key and attributes.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 3, p. 879, doi. 10.1007/s11276-015-1005-1
- By:
- Publication type:
- Article
Multipath source routing strategies for video transmission in ad hoc wireless networks.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 3, p. 859, doi. 10.1007/s11276-014-0823-x
- By:
- Publication type:
- Article
SPEED-MAC: speedy and energy efficient data delivery MAC protocol for real-time sensor network applications.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 3, p. 883, doi. 10.1007/s11276-014-0827-6
- By:
- Publication type:
- Article
An autonomic message dissemination protocol for Vehicular Ad hoc Networks: a density and priority levels aware approach.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 3, p. 1001, doi. 10.1007/s11276-014-0831-x
- By:
- Publication type:
- Article
Mutual Authentication and Updating the Authentication Key in MANETS.
- Published in:
- Wireless Personal Communications, 2015, v. 81, n. 3, p. 1031, doi. 10.1007/s11277-014-2169-1
- By:
- Publication type:
- Article
Power Allocation Based on Finite-Horizon Optimization for Data Transmission in Vehicle-to-Roadside Communications.
- Published in:
- Wireless Personal Communications, 2015, v. 81, n. 3, p. 1177, doi. 10.1007/s11277-014-2178-0
- By:
- Publication type:
- Article
A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 3, p. 1099, doi. 10.1007/s11277-013-1346-y
- By:
- Publication type:
- Article
Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/473609
- By:
- Publication type:
- Article