-
1
-
-
34748845802
-
Flow scheduling for end-host multihoming
-
N. Thompson, G. He, and H. Luo, "Flow scheduling for end-host multihoming," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Thompson, N.1
He, G.2
Luo, H.3
-
2
-
-
32144443127
-
MoB: A mobile bazaar for wide-area wireless services
-
R. Chakravorty, S. Agarwal, S. Banerjee, and I. Pratt, "MoB: A mobile bazaar for wide-area wireless services," in Proc. ACM MobiCom, 2005, pp. 228-242.
-
(2005)
Proc. ACM MobiCom
, pp. 228-242
-
-
Chakravorty, R.1
Agarwal, S.2
Banerjee, S.3
Pratt, I.4
-
4
-
-
37749035946
-
Authentication on the edge distributed authentication for a global open Wi-Fi networks
-
N. A. Thompson, Z. Yin, H. Luo, P. Zerfos, and J. P. Singh, "Authentication on the edge distributed authentication for a global open Wi-Fi networks," in Proc. MobiCom, 2007, pp. 334-337.
-
(2007)
Proc. MobiCom
, pp. 334-337
-
-
Thompson, N.A.1
Yin, Z.2
Luo, H.3
Zerfos, P.4
Singh, J.P.5
-
5
-
-
27544467559
-
Emerging issues in researching community-based WLANs
-
Fall
-
M. Bina and G. Gialis, "Emerging issues in researching community-based WLANs," J. Comput. Inf. Syst., vol. 46, no. 1, pp. 9-16, Fall 2005.
-
(2005)
J. Comput. Inf. Syst
, vol.46
, Issue.1
, pp. 9-16
-
-
Bina, M.1
Gialis, G.2
-
6
-
-
0033296116
-
Untraceable mobility or how to travel incognito
-
Apr
-
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "Untraceable mobility or how to travel incognito," Comput. Netw., vol. 31, no. 8, pp. 871-884, Apr. 1999.
-
(1999)
Comput. Netw
, vol.31
, Issue.8
, pp. 871-884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
7
-
-
0347380855
-
Wireless location privacy protection
-
Dec
-
B. Schilit, J. Hong, and M. Gruteser, "Wireless location privacy protection," Comput., vol. 36, no. 12, pp. 135-137, Dec. 2003.
-
(2003)
Comput
, vol.36
, Issue.12
, pp. 135-137
-
-
Schilit, B.1
Hong, J.2
Gruteser, M.3
-
8
-
-
66449089654
-
-
Online, Available
-
802.1x. [Online]. Available: http://standards.ieee.org/getieee802/ download/802.1x-2004.pdf
-
802.1x
-
-
-
9
-
-
66449085454
-
Analysis of roaming techniques
-
Online, Available
-
A. Alimian and B. Aboba, "Analysis of roaming techniques," IEEE. 802.11-04/0377rl. [Online]. Available: http://www.drizzle.com/~aboba/IEEE
-
IEEE. 802.11-04/0377rl
-
-
Alimian, A.1
Aboba, B.2
-
10
-
-
7244236291
-
Localised authentication for inter-network roaming across wireless LANs
-
Oct
-
M. Long, C. H. Wu, and J. D. Irwin, "Localised authentication for inter-network roaming across wireless LANs," Proc. Inst. Elect. Eng. - Commun., vol. 151, no. 5, pp. 496-500, Oct. 2004.
-
(2004)
Proc. Inst. Elect. Eng. - Commun
, vol.151
, Issue.5
, pp. 496-500
-
-
Long, M.1
Wu, C.H.2
Irwin, J.D.3
-
11
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks
-
Oct
-
Y. Zhang and Y. Fang, "ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks," IEEE J. Sel. Areas Commun. vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
12
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
Oct
-
Y. Zhang and Y. Fang, "A secure authentication and billing architecture for wireless mesh networks," Wirel. Netw., vol. 13, no. 5, pp. 663-678, Oct. 2007.
-
(2007)
Wirel. Netw
, vol.13
, Issue.5
, pp. 663-678
-
-
Zhang, Y.1
Fang, Y.2
-
13
-
-
55149089837
-
Provably secure robust threshold partial blind signature
-
Z. Cao, H. Zhu, and R. Lu, "Provably secure robust threshold partial blind signature," Sci. China Ser. E, vol. 35, no. 12, pp. 1254-1265, 2005.
-
(2005)
Sci. China Ser. E
, vol.35
, Issue.12
, pp. 1254-1265
-
-
Cao, Z.1
Zhu, H.2
Lu, R.3
-
14
-
-
0042244158
-
An offline check system with reusable refunds
-
S. Kim and H. Oh, "An offline check system with reusable refunds," IEICE Trans. Commun., vol. 86, no. 3, pp. 1136-1139, 2003.
-
(2003)
IEICE Trans. Commun
, vol.86
, Issue.3
, pp. 1136-1139
-
-
Kim, S.1
Oh, H.2
-
15
-
-
36349017875
-
TTP based privacy preserving inter-WISP roaming architecture for wireless metropolitan area networks
-
Hong Kong, Mar
-
H. Zhu, X. Lin, P.-H. Ho, X. Shen, and M. Shi, "TTP based privacy preserving inter-WISP roaming architecture for wireless metropolitan area networks," in Proc. IEEE WCNC, Hong Kong, Mar. 2007, pp. 2957-2962.
-
(2007)
Proc. IEEE WCNC
, pp. 2957-2962
-
-
Zhu, H.1
Lin, X.2
Ho, P.-H.3
Shen, X.4
Shi, M.5
-
16
-
-
33244465417
-
Running cellular/PWLAN services: Practical considerations for cellular/PWLAN architecture supporting interoperator roaming
-
Feb
-
J. Leu, R. Lai, H. Lin, and W. Shih, "Running cellular/PWLAN services: Practical considerations for cellular/PWLAN architecture supporting interoperator roaming," IEEE Commun. Mag., vol. 44, no. 2, pp. 73-84, Feb. 2006.
-
(2006)
IEEE Commun. Mag
, vol.44
, Issue.2
, pp. 73-84
-
-
Leu, J.1
Lai, R.2
Lin, H.3
Shih, W.4
-
17
-
-
66449111758
-
-
Online, Available
-
Abitcool Wi-Fi Community. [Online]. Available: http:// www.abitcool.com
-
Abitcool Wi-Fi Community
-
-
-
18
-
-
66449103970
-
-
Fon. [Online]. Available: http://www.fon.com
-
Fon. [Online]. Available: http://www.fon.com
-
-
-
-
19
-
-
7244227670
-
Fast handoff scheme based on mobility prediction in public wireless LAN systems
-
Oct
-
S. Pack and Y. Choi, "Fast handoff scheme based on mobility prediction in public wireless LAN systems," Proc. Inst. Elect. Eng. - Commun. vol. 151, no. 5, pp. 489-495, Oct. 2004.
-
(2004)
Proc. Inst. Elect. Eng. - Commun
, vol.151
, Issue.5
, pp. 489-495
-
-
Pack, S.1
Choi, Y.2
-
20
-
-
1842665111
-
Proactive key distribution using neighbor graphs
-
Feb
-
A. Mishra, M. H. Shin, N. L. Petroni, J. T. Clancy, and W. A. Arbaugh, "Proactive key distribution using neighbor graphs," IEEE Wireless Commun., vol. 11, no. 1, pp. 26-36, Feb. 2004.
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.H.2
Petroni, N.L.3
Clancy, J.T.4
Arbaugh, W.A.5
-
21
-
-
22944487012
-
An enhanced inter-access point protocol for uniform intra and intersubnet handovers
-
Jul./Aug
-
C. Chou and K. G. Shin, "An enhanced inter-access point protocol for uniform intra and intersubnet handovers," IEEE Trans. Mobile Comput. vol. 4, no. 4, pp. 321-334, Jul./Aug. 2005.
-
(2005)
IEEE Trans. Mobile Comput
, vol.4
, Issue.4
, pp. 321-334
-
-
Chou, C.1
Shin, K.G.2
-
22
-
-
55149100626
-
SLAB: Secure localized authentication and billing scheme for wireless mesh networks
-
Oct
-
H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, "SLAB: Secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 3858-3868, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.17
, Issue.10
, pp. 3858-3868
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
23
-
-
35148874531
-
A service-agent-based roaming architecture for WLAN/cellular integrated networks
-
Sep
-
M. Shi, H. Rutagemwa, X. Shen, J. W. Mark, and A. Saleh, "A service-agent-based roaming architecture for WLAN/cellular integrated networks," IEEE Trans. Veh. Technol., vol. 56, no. 5, pp. 3168-3181, Sep. 2007.
-
(2007)
IEEE Trans. Veh. Technol
, vol.56
, Issue.5
, pp. 3168-3181
-
-
Shi, M.1
Rutagemwa, H.2
Shen, X.3
Mark, J.W.4
Saleh, A.5
-
24
-
-
34250647448
-
Fast vertical handoff for cellular and WLAN interworking
-
M. Shi, L. Xu, X. Shen, and J.W. Mark, "Fast vertical handoff for cellular and WLAN interworking," Wiley's Wireless Commun. Mobile Comput., vol. 7, no. 5, pp. 581-594, 2007.
-
(2007)
Wiley's Wireless Commun. Mobile Comput
, vol.7
, Issue.5
, pp. 581-594
-
-
Shi, M.1
Xu, L.2
Shen, X.3
Mark, J.W.4
-
26
-
-
26844521290
-
Self-organisation in mobile networking
-
E. C. Efstathiou and G. C. Polyzos, "Self-organisation in mobile networking," Eur. Trans. Telecommun., vol. 16, pp. 471-482, 2005.
-
(2005)
Eur. Trans. Telecommun
, vol.16
, pp. 471-482
-
-
Efstathiou, E.C.1
Polyzos, G.C.2
-
27
-
-
33847279457
-
A solution for wireless privacy and payments based on E-cash
-
Athens, Greece, Sep
-
Y. Tsiounis, A. Kiayias, and A. Karygiannis, "A solution for wireless privacy and payments based on E-cash," in Proc. IEEE SecureComm, Athens, Greece, Sep. 2005, pp. 206-218.
-
(2005)
Proc. IEEE SecureComm
, pp. 206-218
-
-
Tsiounis, Y.1
Kiayias, A.2
Karygiannis, A.3
-
28
-
-
0034515361
-
MNPA: A mobile network privacy architecture
-
Dec
-
B. Askwith, M. Merabti, and Q. Shi, "MNPA: A mobile network privacy architecture," Comput. Commun., vol. 23, no. 18, pp. 1777-1788, Dec. 2000.
-
(2000)
Comput. Commun
, vol.23
, Issue.18
, pp. 1777-1788
-
-
Askwith, B.1
Merabti, M.2
Shi, Q.3
-
29
-
-
0842289253
-
Authentication and payment protocol preserving location privacy in mobile IP
-
San Francisco, CA
-
S. Choi and K. Kim, "Authentication and payment protocol preserving location privacy in mobile IP," in Proc. IEEE GLOBECOM, San Francisco, CA, 2003, vol. 3, pp. 1410-1414.
-
(2003)
Proc. IEEE GLOBECOM
, vol.3
, pp. 1410-1414
-
-
Choi, S.1
Kim, K.2
-
30
-
-
2542616812
-
The quest for personal control over mobile location privacy
-
May
-
Q. He, D. Wu, and P. Khosla, "The quest for personal control over mobile location privacy," IEEE Commun. Mag., vol. 42, no. 5, pp. 130-136, May 2004.
-
(2004)
IEEE Commun. Mag
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
31
-
-
84957629646
-
Fair blind signatures
-
M. Stadler, J. M. Piveteau, and J. Camenisch, "Fair blind signatures," in Proc. Eurocrypt, 1995, vol. 921, pp. 209-219.
-
(1995)
Proc. Eurocrypt
, vol.921
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.M.2
Camenisch, J.3
-
32
-
-
0001604533
-
Blind signatures for untraceable payments
-
New York: Springer-Verlag
-
D. Chaum, "Blind signatures for untraceable payments," in Proc. CRYPTO. New York: Springer-Verlag, vol. 1982, pp. 199-203.
-
Proc. CRYPTO
, vol.1982
, pp. 199-203
-
-
Chaum, D.1
-
33
-
-
84955599449
-
How to date blind signatures
-
New York: Springer-Verlag
-
M. Abe and E. Fujisaki, "How to date blind signatures," in Proc. ASIA-CRYPT. New York: Springer-Verlag, 1996, vol. 1163, pp. 244-251.
-
(1996)
Proc. ASIA-CRYPT
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
34
-
-
0345121671
-
-
Mass. Inst. Technol. Lab. Comput. Sci, Cambridge, MA, Tech. Rep. LCS/TR-212
-
M. O. Rabin, "Digitized signatures and public-key functions as intractable as factorization," Mass. Inst. Technol. Lab. Comput. Sci, Cambridge, MA, Tech. Rep. LCS/TR-212, 1979.
-
(1979)
Digitized signatures and public-key functions as intractable as factorization
-
-
Rabin, M.O.1
-
35
-
-
24644449780
-
Efficient cooperative signature: A novel authentication scheme for sensor networks
-
New York: Spring-Verlag
-
S. Seys and B. Prenee, "Efficient cooperative signature: A novel authentication scheme for sensor networks," in Proc. SPC. New York: Spring-Verlag, 2005, vol. 3450, pp. 86-100.
-
(2005)
Proc. SPC
, vol.3450
, pp. 86-100
-
-
Seys, S.1
Prenee, B.2
-
37
-
-
34848855786
-
Combating double-spending using cooperative P2P systems
-
I. Osipkov, E. Y. Vasserman, and N. Hopper, "Combating double-spending using cooperative P2P systems," in Proc. ICDCS, 2007, p. 41.
-
(2007)
Proc. ICDCS
, pp. 41
-
-
Osipkov, I.1
Vasserman, E.Y.2
Hopper, N.3
-
38
-
-
84890873195
-
Single term off-line coins
-
New York: Springer-Verlag
-
N. Ferguson, "Single term off-line coins," in Proc. EUROCRYPT. New York: Springer-Verlag, 1993, vol. 765, pp. 318-328.
-
(1993)
Proc. EUROCRYPT
, vol.765
, pp. 318-328
-
-
Ferguson, N.1
-
39
-
-
3242812593
-
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
-
NewYork: Springer-Verlag
-
Y. Desmedt and A. Odlyzko, "A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes," in Proc. CRYPTO NewYork: Springer-Verlag, 1985, vol. 218, pp. 516-552.
-
(1985)
Proc. CRYPTO
, vol.218
, pp. 516-552
-
-
Desmedt, Y.1
Odlyzko, A.2
-
40
-
-
84957066742
-
On the security of RSA padding
-
New York: Springer-Verlag
-
J. S. Coron, D. Naccache, and J. P. Stern, "On the security of RSA padding," in Proc. CRYPTO. New York: Springer-Verlag, 1999, vol. 1666, pp. 1-18.
-
(1999)
Proc. CRYPTO
, vol.1666
, pp. 1-18
-
-
Coron, J.S.1
Naccache, D.2
Stern, J.P.3
-
43
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Aug
-
C. K. Wong and S. S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Netw., vol. 7, no. 4, pp. 502-513, Aug. 1999.
-
(1999)
IEEE/ACM Trans. Netw
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.S.2
-
44
-
-
35048860314
-
-
Α variation of the WTLS authentication protocol for reducing energy consumption in wireless devices, Toulouse, France
-
P. Prasithsangaree and P. Krishnamurthy, Α variation of the WTLS authentication protocol for reducing energy consumption in wireless devices," in Proc. 7th IEEE Int. Conf. High Speed Netw. Multimedia Commun., Toulouse, France, 2004, pp. 696-706.
-
(2004)
Proc. 7th IEEE Int. Conf. High Speed Netw. Multimedia Commun
, pp. 696-706
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
45
-
-
2542463114
-
Architecture for mobility and QoS support in all-IP wireless networks
-
May
-
S. Lo, G. Lee, W. Chen, and J. Liu, "Architecture for mobility and QoS support in all-IP wireless networks," IEEE J. Sel. Areas Commun., vol. 22, no. 4, pp. 691-705, May 2004.
-
(2004)
IEEE J. Sel. Areas Commun
, vol.22
, Issue.4
, pp. 691-705
-
-
Lo, S.1
Lee, G.2
Chen, W.3
Liu, J.4
-
46
-
-
0031075907
-
Reducing location update cost in a PCS network
-
Feb
-
Y. Lin, "Reducing location update cost in a PCS network," IEEE/ACM Trans. Netw., vol. 5, no. 2, pp. 25-33, Feb. 1997.
-
(1997)
IEEE/ACM Trans. Netw
, vol.5
, Issue.2
, pp. 25-33
-
-
Lin, Y.1
-
47
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Mar./Apr
-
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Trans. Mobile Comput., vol. 5, no. 2, pp. 128-143, Mar./Apr. 2006.
-
(2006)
IEEE Trans. Mobile Comput
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
48
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Pisa, Italy, Mar
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. IEEE PerCom, Pisa, Italy, Mar. 2005, pp. 324-328.
-
(2005)
Proc. IEEE PerCom
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
49
-
-
84887962704
-
A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots
-
S. Baek, S. Pack, T. Kwon, and Y. Choi, "A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots," in Proc. 3rd Annu. Conf. Wireless On-Demand Netw. Syst. Serv., WONS, 2006, pp. 144-153.
-
(2006)
Proc. 3rd Annu. Conf. Wireless On-Demand Netw. Syst. Serv., WONS
, pp. 144-153
-
-
Baek, S.1
Pack, S.2
Kwon, T.3
Choi, Y.4
|