Search Results - "Manshaei, H."

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Non-Cooperative Location Privacy by Freudiger, J., Manshaei, M. H., Hubaux, Jean-Pierre, Parkes, D. C.

    “…In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for…”
    Get full text
    Journal Article
  2. 2

    CLARA: closed-loop adaptive rate allocation for IEEE 802.11 wireless LANs by Hoffmann, C., Manshaei, H., Turletti, T.

    “…We propose a closed-loop, dynamic rate adaptation algorithm that can be implemented in all IEEE 802.11 a/b/g compliant wireless local area networks. Our…”
    Get full text
    Conference Proceeding
  3. 3

    Performance analysis of the IEEE 802.11 MAC and physical layer protocol by Manshaei, M.H., Cantieni, G.R., Barakat, C., Turletti, T.

    “…We present an analytical model that accounts for the positions of stations with respect to the access point (AP) while evaluating the performance of the 802.11…”
    Get full text
    Conference Proceeding