-
3
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
to Appear
-
Y. Zhang and Y. Fang, "A secure authentication and billing architecture for wireless mesh networks," ACM Wireless Networks, to Appear.
-
ACM Wireless Networks
-
-
Zhang, Y.1
Fang, Y.2
-
4
-
-
33749856769
-
Arsa: An attack-resilient security architecture for multi-hop wireless mesh networks
-
Oct
-
_, "Arsa: an attack-resilient security architecture for multi-hop wireless mesh networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
8
-
-
85024290278
-
Group signatures
-
D. Chaum and E. van Heyst, "Group signatures," in Proceedings of Eurocrypt, LNCS, vol. 547, 1991, pp. 257-265.
-
(1991)
Proceedings of Eurocrypt, LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2.
-
Communications of the ACM
, vol.21
, Issue.2
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
11
-
-
1542326337
-
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
-
N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks," in ACM MobiHoc, 2003.
-
(2003)
ACM MobiHoc
-
-
Salem, N.1
Buttyan, L.2
Hubaux, J.3
Jakobsson, M.4
-
13
-
-
51849145262
-
A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks,
-
Technical Report
-
K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks," in Technical Report, 2008.
-
(2008)
-
-
Ren, K.1
Lou, W.2
-
14
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in 6th NDSS, 1999.
-
(1999)
6th NDSS
-
-
Juels, A.1
Brainard, J.2
-
15
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short signatures from the weil pairing," Journal of Cryptology, vol. 17, no. 4.
-
Journal of Cryptology
, vol.17
, Issue.4
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
19
-
-
34547484913
-
Achieving privacy in mesh networks
-
X. Wu and N. Li, "Achieving privacy in mesh networks," in ACM SASN, 2006.
-
(2006)
ACM SASN
-
-
Wu, X.1
Li, N.2
-
20
-
-
58149131215
-
Tua: A novel compromise-resilient authentication architecture for wireless mesh networks
-
To Appear
-
X. Lin, R. Lu, P.-H. Ho, X. Shen, and Z. Cao, "Tua: A novel compromise-resilient authentication architecture for wireless mesh networks," IEEE Transactions on Wireless Communications, To Appear.
-
IEEE Transactions on Wireless Communications
-
-
Lin, X.1
Lu, R.2
Ho, P.-H.3
Shen, X.4
Cao, Z.5
-
21
-
-
51849141536
-
A novel localized authentication scheme in ieee 802.11 based wireless mesh networks
-
X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. Shen, "A novel localized authentication scheme in ieee 802.11 based wireless mesh networks," International Journal of Security and Networks, vol. 3, no. 2, pp. 122-132, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
22
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environment
-
July
-
K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environment," IEEE Transactions on Vehicular Technology (TVT), vol. 55, no. 4, pp. 1373-1384, July 2006.
-
(2006)
IEEE Transactions on Vehicular Technology (TVT)
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
23
-
-
33846307093
-
Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
-
K. Ren and W. Lou, "Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability," ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access), vol. 12, pp. 79-92, 2007.
-
(2007)
ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access)
, vol.12
, pp. 79-92
-
-
Ren, K.1
Lou, W.2
|