[go: up one dir, main page]

Prasad et al., 2009 - Google Patents

The top 10 list for terabit speed wireless personal services

Prasad et al., 2009

Document ID
18328797464530185456
Author
Prasad R
Pruthi P
Ramareddy K
Publication year
Publication venue
Wireless personal communications

External Links

Snippet

The need for very high-speed (100 Gigabit to Terabit) wireless networks is less than a decade away. It is being driven by content rich multi-channel high-resolution video, gaming, virtual reality, collaboration, and other non-typical applications such as defense and warfare …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Fire et al. Online social networks: threats and solutions
CN110521172A (en) For handling the method and system of of short duration content-message
US11895144B2 (en) Systems and methods for network security
Albrecht et al. Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong
Van Puyvelde et al. Cybersecurity: politics, governance and conflict in cyberspace
Turner et al. A promising integration of sdn and blockchain for iot networks: A survey
Mawgoud et al. Security threats of social internet of things in the higher education environment
Al-Muhtadi et al. Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things
Zhang et al. The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
Rajawat et al. Scheme invisible internet protocol (I2P) using blockchain techniques for tracking darkweb user activities
Nyasvisvo et al. Phishing attacks: A security challenge for university students studying remotely
Etuh et al. Social Media Networks Attacks and their Preventive Mechanisms: A Review
Landau Categorizing uses of communications metadata: Systematizing knowledge and presenting a path for privacy
Prasad et al. The top 10 list for terabit speed wireless personal services
Frumento et al. The role of Social Engineering in evolution of attacks
Gekker Legionnaires of chaos:‘Anonymous’ and governmental oversight of the Internet
Kumar et al. Online social networks: Privacy challenges and proposed security framework for facebook
Fatima et al. AI-Powered Phishing Detection and Mitigation for IoT-Based Smart Home Security
Fraser A Next Generation Internet Architecture
Mahalle et al. Authorization and Access Control: Foundations, Frameworks, and Applications
Shackelford et al. Forks in the Digital Road: Key Decisions in the History of the Internet
Al Shakosh Cybersecurity awareness among Swedish young adults in usage of public Wi-Fi networks
Annamalai et al. Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms
Ahmad Internet of Things: Tapping into security and privacy issues associated with the internet of things
Mawgoud et al. Security Threats of Social Internet of Things in the Higher Education