-
1
-
-
13844296355
-
Wireless mesh networks: A survey
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw. ISDN Syst., vol. 47, no. 4, pp. 445-487, 2005.
-
(2005)
Comput. Netw. ISDN Syst.
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
April
-
C. Tang and D. Wu, "An efficient mobile authentication scheme for wireless networks," Wireless Communications, IEEE Transactions on, vol. 7, no. 4, pp. 1408-1416, April 2008.
-
(2008)
Wireless Communications, IEEE Transactions on
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.2
-
3
-
-
51649125749
-
Security Considerations for Handover Schemes in Mobile WiMAX Networks
-
J. Hur, H. Shim, P. Kim, H. Yoon, and N.-O. Song, "Security Considerations for Handover Schemes in Mobile WiMAX Networks," in Proceedings of IEEE Wireless Communications and Networking Conference, 2008. WCNC 2008, Las Vegas, NV, March 2008.
-
Proceedings of IEEE Wireless Communications and Networking Conference, 2008. WCNC 2008, Las Vegas, NV, March 2008
-
-
Hur, J.1
Shim, H.2
Kim, P.3
Yoon, H.4
Song, N.-O.5
-
6
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
New York, NY, USA: ACM
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM, 2001, pp. 146-155.
-
(2001)
MobiHoc '01: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
9
-
-
58049108200
-
Dynamic distributed authentication scheme for wireless lan-based mesh networks
-
Revised Selected Papers
-
I. Lee, J. Lee, W. Arbaugh, and D. Kim, "Dynamic distributed authentication scheme for wireless lan-based mesh networks," Information Networking. Towards Ubiquitous Networking and Services: International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 649-658, 2008.
-
(2008)
Information Networking. Towards Ubiquitous Networking and Services: International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007
, pp. 649-658
-
-
Lee, I.1
Lee, J.2
Arbaugh, W.3
Kim, D.4
-
10
-
-
21644465663
-
-
Nov. 2004, vol.2
-
R. Soltwisch, X. Fu, D. Hogrefe, and S. Narayanan, "A method for authentication and key exchange for seamless inter-domain handovers," vol. 2, Nov. 2004, pp. 463-469 vol.2.
-
A Method for Authentication and Key Exchange for Seamless Inter-domain Handovers
, vol.2
, pp. 463-469
-
-
Soltwisch, R.1
Fu, X.2
Hogrefe, D.3
Narayanan, S.4
-
11
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
Y. Zhang and Y. Fang, "A secure authentication and billing architecture for wireless mesh networks," Wirel. Netw., vol. 13, no. 5, pp. 663-678, 2007.
-
(2007)
Wirel. Netw.
, vol.13
, Issue.5
, pp. 663-678
-
-
Zhang, Y.1
Fang, Y.2
-
12
-
-
77954083903
-
How to secure multi-domain wireless mesh networks
-
[Online]. Available
-
X. Zhu, Y. Fang, and Y. Wang, "How to secure multi-domain wireless mesh networks," Wireless Networks, vol. 16, pp. 1215-1222, 2010. [Online]. Available: http://dx.doi.org/10.1007/s11276-009-0198-6
-
(2010)
Wireless Networks
, vol.16
, pp. 1215-1222
-
-
Zhu, X.1
Fang, Y.2
Wang, Y.3
-
13
-
-
74349129978
-
An authentication scheme for qos-aware multioperator maintained wireless mesh networks
-
L. Buttyán and L. Dóra, "An authentication scheme for qos-aware multioperator maintained wireless mesh networks," in First IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH09), Kos, Greece, 2009, pp. 1-6.
-
First IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH09), Kos, Greece, 2009
, pp. 1-6
-
-
Buttyán, L.1
Dóra, L.2
-
14
-
-
51849119157
-
A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks
-
Washington, DC, USA: IEEE Computer Society
-
K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks," in ICDCS '08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2008, pp. 286-294.
-
(2008)
ICDCS '08: Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems
, pp. 286-294
-
-
Ren, K.1
Lou, W.2
-
15
-
-
51849141536
-
A novel localised authentication scheme in ieee 802.11 based wireless mesh networks
-
X. Lin, X. Ling, H. Zhu, P. Ho, and X. S. Shen, "A novel localised authentication scheme in ieee 802.11 based wireless mesh networks," Int. J. Secur. Netw., vol. 3, no. 2, pp. 122-132, 2008.
-
(2008)
Int. J. Secur. Netw.
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.S.5
-
16
-
-
79551630414
-
An efficient authenticated key establishment scheme for wireless mesh networks
-
B. He, S. Joshi, D. Agrawal, and D. Sun, "An efficient authenticated key establishment scheme for wireless mesh networks," in IEEE Globecom 2010 - Ad-hoc and Sensor Networking Symposium (GC10 - AHSN), Miami, Florida, USA, December 2010.
-
IEEE Globecom 2010 - Ad-hoc and Sensor Networking Symposium (GC10 - AHSN), Miami, Florida, USA, December 2010
-
-
He, B.1
Joshi, S.2
Agrawal, D.3
Sun, D.4
-
17
-
-
55149100626
-
Slab: Secure localized authentication and billing scheme for wireless mesh networks
-
H. Zhu, X. Lin, S. Member, R. Lu, P. han Ho, and X. Shen, "Slab: Secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun, pp. 3858-3868, 2008.
-
(2008)
IEEE Trans. Wireless Commun
, pp. 3858-3868
-
-
Zhu, H.1
Lin, X.2
Member, S.3
Lu, R.4
Han Ho, P.5
Shen, X.6
-
18
-
-
42649093474
-
Optimizing deployment of internet gateway in wireless mesh networks
-
B. He, B. Xie, and D. P. Agrawal, "Optimizing deployment of internet gateway in wireless mesh networks," Computer Communications, vol. 31, no. 7, pp. 1259-1275, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.7
, pp. 1259-1275
-
-
He, B.1
Xie, B.2
Agrawal, D.P.3
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA: Springer-Verlag New York, Inc.
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
22
-
-
84957001208
-
Entity authentication and authenticated key transport protocols employing asymmetric techniques
-
London, UK: Springer-Verlag
-
S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proceedings of the 5th International Workshop on Security Protocols. London, UK: Springer-Verlag, 1998, pp. 137-158.
-
(1998)
Proceedings of the 5th International Workshop on Security Protocols
, pp. 137-158
-
-
Blake-Wilson, S.1
Menezes, A.2
-
23
-
-
0032676481
-
Enhanced privacy and authentication for the global system for mobile communications
-
C.-H. Lee, M.-S. Hwang, and W.-P. Yang, "Enhanced privacy and authentication for the global system for mobile communications," Wirel. Netw., vol. 5, no. 4, pp. 231-243, 1999.
-
(1999)
Wirel. Netw.
, vol.5
, Issue.4
, pp. 231-243
-
-
Lee, C.-H.1
Hwang, M.-S.2
Yang, W.-P.3
|