Back to Results
First PageMeta Content
Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data


Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering
Add to Reading List

Document Date: 2010-02-05 14:49:04


Open Document

File Size: 226,91 KB

Share Result on Facebook

City

Tucson / /

Company

TCP ACKs / AES / I. I NTRODUCTION Wireless / McGraw-Hill Companies / /

/

Facility

Computer Engineering University of Arizona / Prentice Hall / /

IndustryTerm

jam communications / wireless channel / online key distribution center / zero-knowledge protocols / wireless denial / ordinary block encryption algorithm / Secure communications / lower energy cost / conventional symmetric algorithm / multi-hop wireless route / invertible pre-processing step / brute force search attacks / ad hoc networking / magnitude less energy / ad hoc networks / Energy-efficient link-layer jamming attacks / power management / spread spectrum communications / Law et / wireless network / Spread spectrum communications handbook / wireless systems / obvious solution / multi-hop wireless networks / encryption algorithms / wireless network security / virtual carrier sensing / wireless transmissions / wireless links / computing / wireless medium / Wireless security / data wireless / Wireless Networks / randomized frequency hopping algorithm / energy / /

OperatingSystem

DoS / /

Organization

National Science Foundation / University of Arizona / ON TCP / /

Person

E. Altman / P. Nain / A. Al Hanbali / /

ProvinceOrState

Arizona / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / symmetric key encryption / Cryptography / full-duplex / randomized frequency hopping algorithm / one symmetric encryption / WSN MAC protocols / encryption algorithms / All-or-nothing encryption / frequency hopping / Mobile Computing / conventional symmetric algorithm / zero-knowledge protocols / html / block encryption / ordinary block encryption algorithm / network protocols / /

URL

http /

SocialTag