نتایج جستجو برای: mac method
تعداد نتایج: 1654775 فیلتر نتایج به سال:
در شبکه های بی سیم تشخیص و محاسبه ی محدودیت های ارتباطی قابل دستیابی اعم از throughput و مصرف انرژی، به عنوان یک مشکل اساسی مطرح می باشد. عملکرد کلی شبکه های بی سیم و تأثیرات متقابل لایه های شبکه بر روی یکدیگر هنوز به طور کامل مطالعه نشده است و تحقیقات روی این موضوعات ادامه دارد. کاربردهای شبکه های بی سیم و ویژگی های ارتباطات بی سیم مسائل جدیدی در طراحی cross-layer معرفی کرده است که ورای مفهوم ...
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than it has been when considered from other viewpoints. In this paper, we can look PMAC with two keys as a Carter-Wegman MAC and get a simple security proof for it. Using this viewpoint to look at PMAC, we will learn not o...
Due to the limited bandwidth in wireless networks, careful resource allocation schemes must be used to allocate bandwidth to applications. There are two typical types of applications in wireless networks that require resource allocation: soft realtime applications and best effort applications. While soft realtime applications require QoS support for effective bandwidth utilization, best effort ...
IEEE 802.11 MAC protocol for medium access control in wireless Local Area Networks (LANs) is the de facto standard for wireless ad hoc networks. However, it does not perform well in terms of fairness, delay and throughput specially, in multihop networks. The problem is due to both the MAC and link layer contentions. Many research papers have been published in these fields. Among them, a modific...
Message authentication codes (MACs) are an essential primitive in cryptography. They are used to ensure the integrity and authenticity of a message, and can also be used as a building block for larger schemes, such as chosenciphertext secure encryption, or identity-based encryption. MACs are often built in two steps: first, the ‘front end’ of the MAC produces a short digest of the long message,...
The effect on the minimiim alveolar concentration of halothane (MAC) during extretne hypocapnia with oxygen, and with air, was determined in nine dogs. MAC was unaffected by hypocapnia with halothane-oxygen. Changing halothane-oxygen to halothane-air reduced the MAC significantly in only five of nine dogs. The average decrease in this group of nine dogs was H per cent, only slightly more than t...
This paper explores a MAC (Medium Access Control) layer throughput with DCF (Distributed Coordination Function) protocol in the IEEE 802.11a/g/n-based mobile LAN. It is evaluated in Rayleigh fading wireless channel, using theoretical analysis method. The DCF throughput performance is analyzed by using the number of stations with both variable payload size and mobile speed on the condition that ...
In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepe...
This paper presents a technique for accessing channel based on sequencing technique for 802.11 wireless networks. The objective of this method is to reduce, as well as to avoid the number of collisions while accessing channel by many nodes at the same time. A concept of sequence number is introduced to avoid collisions. The transmission of a node takes place after checking the sequence number. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید