Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
From MaRDI portal
Publication:3399550
Recommendations
- Saturation throughput analysis of RTS/CTS scheme in an error-prone WLAN channel
- scientific article; zbMATH DE number 2088598
- Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations
- Formal analysis of authentication in 802.11i
- A capacity analysis for the IEEE 802. 11 MAC protocol
This page was built for publication: Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399550)