-
1
-
-
13844296355
-
Wireless mesh networks: A survey
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: A survey," Computer Networks, vol. 47, no. 4, pp. 445-487, 2005.
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
50249169022
-
Proposed routing for IEEE 802.11s WLAN mesh networks
-
Boston, MA, USA, Aug
-
M. Bahr, "Proposed routing for IEEE 802.11s WLAN mesh networks," 2nd Annual International Wireless Internet Conference (WICON), pp. 133-144, Boston, MA, USA, Aug. 2006.
-
(2006)
2nd Annual International Wireless Internet Conference (WICON)
, pp. 133-144
-
-
Bahr, M.1
-
4
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
LNCS 209
-
R. Blom, "An optimal class of symmetric key generation systems," Proceedings of Eurocrypt'84, LNCS 209, pp. 335-338, 1985.
-
(1985)
Proceedings of Eurocrypt'84
, pp. 335-338
-
-
Blom, R.1
-
6
-
-
17744372294
-
Mesh networks: Commodity multihop ad hoc networks
-
R. Bruno, M. Conti, and E. Gregori, "Mesh networks: Commodity multihop ad hoc networks," IEEE Communications Magazine, vol. 43, pp. 123-131, 2005.
-
(2005)
IEEE Communications Magazine
, vol.43
, pp. 123-131
-
-
Bruno, R.1
Conti, M.2
Gregori, E.3
-
7
-
-
11244335412
-
Routing in multiradio, multihop wireless mesh networks
-
R. Draves, J. Padhye, and B. Zill, "Routing in multiradio, multihop wireless mesh networks," Proceedings of ACM Mobicom, pp. 114-128, 2004.
-
(2004)
Proceedings of ACM Mobicom
, pp. 114-128
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
8
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Oct
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, Oct. 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
9
-
-
85008543309
-
Provably secure ondemand routing in mobile adhoc networks
-
L. B. Gergely and I. Vajda, "Provably secure ondemand routing in mobile adhoc networks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1533-1546, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Gergely, L.B.1
Vajda, I.2
-
10
-
-
0035790166
-
Routing with load balancing in wireless Ad hoc networks
-
H. Hassanein and A. Zhou, "Routing with load balancing in wireless Ad hoc networks," Proceedings of ACM MSWiM, pp. 89-96, 2001.
-
(2001)
Proceedings of ACM MSWiM
, pp. 89-96
-
-
Hassanein, H.1
Zhou, A.2
-
11
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sep
-
Y C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Proceedings of MobiCom, pp. 21-38, Atlanta, GA, Sep. 2002.
-
(2002)
Proceedings of MobiCom
, pp. 21-38
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
54249087948
-
2008 A secure hybrid wireless mesh protocol for 802.11s mesh network
-
LNCS 5072
-
M. S. Islam, Y. J. Yoon, M. A. Hamid, and C. S. Hong, "A secure hybrid wireless mesh protocol for 802.11s mesh network," Proceedings of ICCSA 2008, LNCS 5072, pp. 972V985, 2008.
-
(2008)
Proceedings of ICCSA
-
-
Islam, M.S.1
Yoon, Y.J.2
Hamid, M.A.3
Hong, C.S.4
-
14
-
-
78650616634
-
Energy-aware algorithms for AODV in Ad hoc networks
-
Yokosuka, Japan, Jan
-
X. Jing and M. J. Lee, "Energy-aware algorithms for AODV in Ad hoc networks," Proceedings of Mobile Computing and Ubiquitous Networking, pp. 466-468, Yokosuka, Japan, Jan. 2004.
-
(2004)
Proceedings of Mobile Computing and Ubiquitous Networking
, pp. 466-468
-
-
Jing, X.1
Lee, M.J.2
-
15
-
-
0000629443
-
Dynamic source routing in Ad hoc wireless networks
-
D. B. Johnson and D. A Maltz, "Dynamic source routing in Ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
16
-
-
32144462651
-
Experimental comparisons between SAODV and AODV routing protocols
-
Oct
-
Y. Lin, A. H.M. Rad, V.W. S.Wong, and J. H. Song, "Experimental comparisons between SAODV and AODV routing protocols," Proceedings of WMuNeP, pp. 113-122, Oct. 2005.
-
(2005)
Proceedings of WMuNeP
, pp. 113-122
-
-
Lin, Y.1
Rad, A.H.M.2
Wong, V.W.S.3
Song, J.H.4
-
17
-
-
33645695288
-
Energy-efficient and intrusionresilient authentication for ubiquitous access to factory floor information
-
Feb
-
M. Long and J. Wu, "Energy-efficient and intrusionresilient authentication for ubiquitous access to factory floor information," IEEE Transactions on Industrial Informatics, vol. 2, pp. 40-47, Feb. 2006.
-
(2006)
IEEE Transactions on Industrial Informatics
, vol.2
, pp. 40-47
-
-
Long, M.1
Wu, J.2
-
19
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song,"Efficient authentication and signing of multicast streams over lossy channels," Proceedings of IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
84943529186
-
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
-
Providence, Rodhe Island, May
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks," Proceedings of ICDCS International Workshop on Mobile and Wireless Network, pp. 749-755, Providence, Rodhe Island, May 2003.
-
(2003)
Proceedings of ICDCS International Workshop on Mobile and Wireless Network
, pp. 749-755
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|