Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
From MaRDI portal
Publication:3399550
DOI10.3724/SP.J.1087.2008.03183zbMATH Open1171.68352OpenAlexW2069840132MaRDI QIDQ3399550FDOQ3399550
Authors: Wei Chen, Lei Yu, Yingzhou Zhang
Publication date: 12 October 2009
Published in: Journal of Computer Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3724/sp.j.1087.2008.03183
Recommendations
- Saturation throughput analysis of RTS/CTS scheme in an error-prone WLAN channel
- scientific article; zbMATH DE number 2088598
- Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations
- Formal analysis of authentication in 802.11i
- A capacity analysis for the IEEE 802. 11 MAC protocol
wireless local area networkswireless securitydenial of service attack802. 11 protocolsRTS/CTS mechanism
This page was built for publication: Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399550)