-
2
-
-
13844296355
-
Wireless mesh networks: A survey
-
Mar.
-
I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks, vol.47, no.4, pp. 445-487, Mar. 2005.
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
4
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
to be published
-
Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Networks, to be published.
-
ACM Wireless Networks
-
-
Zhang, Y.1
Fang, Y.2
-
5
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks
-
Oct.
-
Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multi-Hop Wireless Mesh Networks," IEEE J. Selected Areas in Comm., vol.24, no.10, pp. 1916-1928, Oct. 2006.
-
(2006)
IEEE J. Selected Areas in Comm.
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
6
-
-
75449089971
-
-
"The Wimax Forum,"http://www.wimaxforum.org. 2009.
-
(2009)
-
-
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol.21, no.2, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
12
-
-
1542326337
-
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
-
N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A Micro- Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks," Proc. ACM MobiHoc, 2003.
-
(2003)
Proc. ACM MobiHoc
-
-
Salem, N.1
Buttyan, L.2
Hubaux, J.3
Jakobsson, M.4
-
14
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Mar.
-
Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
15
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On- Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol.5, no.9, pp. 2376-2385, Sept. 2006. (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
16
-
-
34347244961
-
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
-
Aug.
-
J. Kong, X. Hong, and M. Gerla, "An Identity-Free and On- Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.6, no.8, pp. 888-902, Aug. 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
17
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Nov.
-
B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks (LCN '04), pp. 102-108, Nov. 2004.
-
(2004)
Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks (LCN '04)
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
19
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short Signatures from the Weil Pairing," J. Cryptology, vol.17, no.4, pp. 297-319, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
20
-
-
75449111693
-
-
TinyECC Library
-
TinyECC Library, http://discovery.csc.ncsu.edu/software/ TinyECC/index.html, 2009.
-
(2009)
-
-
-
21
-
-
33646706570
-
Securing wireless mesh networks
-
Apr.
-
N. Ben Salem and J.-P. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless Comm., vol.13, no.2, pp. 50-55, Apr. 2006.
-
(2006)
IEEE Wireless Comm
, vol.13
, Issue.2
, pp. 50-55
-
-
Ben Salem, N.1
Hubaux, J.-P.2
-
25
-
-
77952374026
-
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
-
Z. Wan, K. Ren, B. Zhu, B. Preneel, and M. Gu, "Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks," Proc. ACM Symp. Information, Computer and Comm. Security (AsiaCCS), 2009.
-
(2009)
Proc. ACM Symp. Information, Computer and Comm. Security (AsiaCCS)
-
-
Wan, Z.1
Ren, K.2
Zhu, B.3
Preneel, B.4
Gu, M.5
-
26
-
-
58149131215
-
Tua: A novel compromise-resilient authentication architecture for wireless mesh networks
-
Apr.
-
X. Lin, R. Lu, P.-H. Ho, X. Shen, and Z. Cao, "Tua: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks," IEEE Wireless Comm., vol.7, no.4, pp. 1389-1399, Apr. 2008.
-
(2008)
IEEE Wireless Comm
, vol.7
, Issue.4
, pp. 1389-1399
-
-
Lin, X.1
Lu, R.2
Ho, P.-H.3
Shen, X.4
Cao, Z.5
-
27
-
-
51849141536
-
A novel localized authentication scheme in Ieee 802.11 based wireless mesh networks
-
X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. Shen, "A Novel Localized Authentication Scheme in ieee 802.11 Based Wireless Mesh Networks," Int'l J. Security and Networks, vol.3, no.2, pp. 122- 132, 2008.
-
(2008)
Int'l J. Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
28
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environment
-
July
-
K. Ren, W. Lou, K. Kim, and R. Deng, "A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environment" IEEE Trans. Vehicular Technology, vol.55, no.4, pp. 1373-1384, July 2006.
-
(2006)
IEEE Trans. Vehicular Technology
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
29
-
-
33846307093
-
Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
-
K. Ren and W. Lou, "Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability," ACM Mobile Networks and Applications (MONET) (special issue on wireless broadband access), vol.12, pp. 79-92, 2007.
-
(2007)
ACM Mobile Networks and Applications (MONET) (Special Issue on Wireless Broadband Access)
, vol.12
, pp. 79-92
-
-
Ren, K.1
Lou, W.2
-
30
-
-
62249186737
-
On address privacy in mobile ad hoc networks
-
Apr.
-
Y. Zhang and K. Ren, "On Address Privacy in Mobile Ad Hoc Networks," ACM/Springer Mobile Networks and Applications (MONET), vol.14, no.2, pp. 188-197, Apr. 2009.
-
(2009)
ACM/Springer Mobile Networks and Applications (MONET)
, vol.14
, Issue.2
, pp. 188-197
-
-
Zhang, Y.1
Ren, K.2
|