Medium access represents one of the most critical building blocks regarding the performance of a wireless LAN. In this letter, we compare the performa...
In this letter, we show that for the SPEKE password-authenticated key exchange protocol, an adversary is able to test multiple possible passwords usin...
Recently, the Virtual Software Token Protocol (VSTP) was proposed as a practical method for secure public key infrastructure (PKI) roaming. It enabled...
The performance of transmission control protocol (TCP) is largely dependent upon its loss recovery. Therefore, it is a very important issue whether th...
In this letter, we propose a computational model for calculating blocking probabilities of multifiber wavelength division multiplexing (WDM) optical n...