Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protocolo acceso")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1748

  • Page / 70
Export

Selection :

  • and

HF data link protocol enhancements based on stanag 4538 and stanag 4539, providing greater than 10KBPS throughput over 3KHZ channelsCHAMBERLAIN, M. W; FURMAN, W. N.IEE conference publication. 2003, pp 64-68, issn 0537-9989, isbn 0-85296-755-1, 5 p.Conference Paper

Combating fraud and piracy in conditional access systemsMOOIJ, Wim.Electronic programme guides. Conference. 1999, 9 p.Conference Paper

Increasing the throughput of the homePNA MAC protocolAMODEI, Aurelio JR; HENRIQUE, Lufs; COSTA, M. K et al.Conference on Local Computer Networks. 2004, pp 294-301, isbn 0-7695-2260-2, 1Vol, 8 p.Conference Paper

Comments on the paper: Analysis of collision probabilities for saturated IEEE 802.11 MAC protocol. Authors' replyFOH, C. H; TANTRA, J. W; KUAN, C et al.Electronics Letters. 2007, Vol 43, Num 10, pp 596-597, issn 0013-5194, 2 p.Article

Function extensible Agent Framework with behavior delegationLEE, Ki-Hwa; JUNG, Eui-Hyun; PARK, Yong-Jin et al.Lecture notes in computer science. 2003, pp 376-385, issn 0302-9743, isbn 3-540-40827-4, 10 p.Conference Paper

Stability region of multicarrier channel aware alohaGANESAN, Ghurumuruhan; YE LI; VOOK, Frederick W et al.IEEE transactions on information theory. 2007, Vol 53, Num 9, pp 3212-3218, issn 0018-9448, 7 p.Article

Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism NetworkZHENG, Lijuan; HU, Yingxin; HAN, Zhen et al.IEICE transactions on information and systems. 2012, Vol 95, Num 11, pp 2728-2731, issn 0916-8532, 4 p.Article

AccessnetsMISRA, Sudip.International journal of communication networks and distributed systems (Print). 2009, Vol 2, Num 2-3, issn 1754-3916, 219 p.Serial Issue

A unified approach to analyze multiple access protocols for buffered finite usersSHEIKH, Asrar; TAO WAN; ALAKHDHAR, Zaki et al.Journal of network and computer applications. 2004, Vol 27, Num 1, pp 49-76, issn 1084-8045, 28 p.Article

Integrating Diffie-Hellman key exchange into the digital signature Algorithm (DSA)HARN, Lein; MEHTA, Manish; HSIN, Wen-Jung et al.IEEE communications letters. 2004, Vol 8, Num 3, pp 198-200, issn 1089-7798, 3 p.Article

Selected Papers from the Conference 'European Wireless 2002'WALKE, Bernhard H; LUISE, Marco.European transactions on telecommunications. 2003, Vol 14, Num 1, issn 1124-318X, 97 p.Conference Proceedings

Exploiting ad hoc meshes in IP based access networksHANCOCK, R; WEST, M; HEPWORTH, E et al.IEE conference publication. 2003, pp 249-253, issn 0537-9989, isbn 0-85296-756-X, 5 p.Conference Paper

Designing advanced mobile applications examples of UMTS trial applicationsKAISER, Fritjof; GRUHN, Volker; BERGMEIER, Heinz et al.Lecture notes in computer science. 2003, pp 395-399, issn 0302-9743, isbn 3-540-40821-5, 5 p.Conference Paper

On unconditionally secure distributed oblivious transferNIKOV, Ventzislav; NIKOVA, Svetla; PRENEEL, Bart et al.Lecture notes in computer science. 2002, pp 395-408, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper

Analysis of the SPEKE password-authenticated key exchange protocolMUXIANG ZHANG.IEEE communications letters. 2004, Vol 8, Num 1, pp 63-65, issn 1089-7798, 3 p.Article

Development and validation of evolutionary algorithm software as an optimization tool for biological and environmental applicationsSYS, K; BOON, N; VERSTRAETE, W et al.Journal of microbiological methods. 2004, Vol 57, Num 3, pp 309-322, issn 0167-7012, 14 p.Article

To read transmitter-only RFID tags with confidenceBIN ZHEN; KOBAYASHI, Mamoru; SHIMIZU, Masashi et al.IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. 2004, pp 396-400, isbn 0-7803-8523-3, 4Vol, 5 p.Conference Paper

An event based approach to web service design and interactionLEMAHIEU, Wilfried; SNOECK, Monique; MICHIELS, Cindy et al.Lecture notes in computer science. 2003, pp 333-340, issn 0302-9743, isbn 3-540-02354-2, 8 p.Conference Paper

Efficient RFID Search Protocols Using Counters : Emerging technologies for practical ubiquitous ans sensor networksKIM, Sangjin; LIM, Jihwan; HAN, Jaehong et al.IEICE transactions on communications. 2008, Vol 91, Num 11, pp 3552-3559, issn 0916-8516, 8 p.Article

Performance analysis of MAC-hs protocolBESTAK, Robert.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25339-4, 2Vol, Part I, 100-108Conference Paper

On the forward secrecy of Chikazawa-Yamagishi ID-based key sharing schemeBAE EUN JUNG.IEEE communications letters. 2004, Vol 8, Num 2, pp 114-115, issn 1089-7798, 2 p.Article

Trading help for interaction in statistical zero-knowledge proofsBEN-OR, Michael; GUTFREUND, Dan.Journal of cryptology. 2003, Vol 16, Num 2, pp 95-116, issn 0933-2790, 22 p.Article

On the performance of a medium access scheme based on EY-NPMA in a high bitrate wireless LANDIMITRIADIS, G; PAVLIDOU, F.-N.Lecture notes in computer science. 2003, pp 153-162, issn 0302-9743, isbn 3-540-20123-8, 10 p.Conference Paper

SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocolsKRAWCZYK, Hugo.Lecture notes in computer science. 2003, pp 400-425, issn 0302-9743, isbn 3-540-40674-3, 26 p.Conference Paper

One round identity-based authenticated conference key agreement protocolKIM, Jeung-Seop; KIM, Hyo-Chul; HA, Kyeoung-Ju et al.Lecture notes in computer science. 2004, pp 407-416, issn 0302-9743, isbn 3-540-23551-5, 10 p.Conference Paper

  • Page / 70