-
2
-
-
77249166094
-
A Survey on Security in Wireless Mesh Networks
-
February 18
-
Ping Yi, Yue Wu, Futai Zou and Ning Liu. "A Survey on Security in Wireless Mesh Networks". IETE, February 18, 2010.
-
(2010)
IETE
-
-
Yi, P.1
Wu, Y.2
Zou, F.3
Liu, N.4
-
3
-
-
80052169081
-
-
Departament of Information Research, Zhengzhou, Information Science and Tecnology Institutem Zhengzhou, P.R. China, February 18
-
L. Guangsong, "An Identity-Based Security Architecture for Wireless Mesh Network", Departament of Information Research, Zhengzhou, Information Science and Tecnology Institutem Zhengzhou, P.R. China, February 18, 2010.
-
(2010)
An Identity-Based Security Architecture for Wireless Mesh Network
-
-
Guangsong, L.1
-
5
-
-
80052158114
-
-
Department of Computer Engineering, Kyung Hee University, Republic of Korea, Departament of Information and Comunications Engineering, Hankuk University of Foreign Studies, Republic of Korea. Springer-Verlag Berling Heidelberg
-
Md. Shariful Islam, Md Abdul Hamid, and Choong Seon Hong, "SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Network", Department of Computer Engineering, Kyung Hee University, Republic of Korea, Departament of Information and Comunications Engineering, Hankuk University of Foreign Studies, Republic of Korea. Springer-Verlag Berling Heidelberg 2009.
-
(2009)
SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Network
-
-
Islam, Md.S.1
Hamid, M.A.2
Hong, C.S.3
-
6
-
-
85020598353
-
Identity based Cryptosystems and Signature Schemes
-
A. Shamir. Identity based Cryptosystems and Signature Schemes. Crypto'84. pp.47-53, 1984.
-
(1984)
Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
7
-
-
84874324906
-
Identify based Encryption from the Weil Pairing
-
Boneh and Franklin. Identify based Encryption from The Weil Pairing. Crypto'01, pp. 213- 219, 2001.
-
(2001)
Crypto'01
, pp. 213-219
-
-
Boneh1
Franklin2
-
11
-
-
79953067606
-
Secure Hash Standard (SHS)
-
U.S. Department of Commerce, National Institute of Standards and Technology
-
U.S. Department of Commerce, National Institute of Standards and Technology. Secure Hash Standard (SHS) (Federal Information Processing Standards Publication 180-3), 2008.
-
(2008)
Federal Information Processing Standards Publication 180-3
-
-
-
12
-
-
85031307530
-
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers
-
August 1 revised version of the paper is available from
-
Charles E. Perkins and Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, pages 234-244, August 1994. 1 revised version of the paper is available from http://www.es.umd.edu/projects/mcml/papers/Sigcomm94. ps.
-
(1994)
Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
14
-
-
84857220399
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
Yin-Chin Hu, Adrian Perrig and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. WiSe 2003, September 19, 2003, San Diego, California, USA.
-
WiSe 2003, September 19, 2003, San Diego, California, USA
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
80054065099
-
Secure Routing for Wireless Mesh Networks
-
Sept.
-
Celia Li, Zhuang Wang, and Cungang Yang. Secure Routing for Wireless Mesh Networks. International Journal of Network Security, Vol. 13, No. 2, PP.109, Sept. 2011.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.2
, pp. 109
-
-
Li, C.1
Wang, Z.2
Yang, C.3
-
17
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad-hoc Networks
-
Y. Hu, A. Perrig, D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad-hoc Networks. MobiCOM'02, September 23-26, 2002, Atlanta Georgia, USA.
-
MobiCOM'02, September 23-26, 2002, Atlanta Georgia, USA
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
0012497782
-
Elliptic Curves and Cryptography
-
April
-
Juriscic and Menezes. "Elliptic Curves and Cryptography". Dr. Dobbs Journal, No. 264, April 1997.
-
(1997)
Dr. Dobbs Journal
, Issue.264
-
-
Juriscic1
Menezes2
-
21
-
-
84856153829
-
A security solution for IEEE 802.11 ad hoc mode: Password-authentication and group DiffieHellman key exchange
-
Emmanuel Bresson, Olivier Chevassut, David Pointcheval."A security solution for IEEE 802.11 ad hoc mode: password-authentication and group DiffieHellman key exchange". Int. J. Wireless and Mobile Computing, Vol. 2, No. 1. 2007.
-
(2007)
Int. J. Wireless and Mobile Computing
, vol.2
, Issue.1
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
24
-
-
84856152028
-
-
FIPS PUB 186-3. Federal Information Processing Standards Publication. Information Technology Laboratory. National Institute of Standards and Technology. Gaithersburg, MD 20899-8900. Issued June
-
FIPS PUB 186-3. Federal Information Processing Standards Publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology. Gaithersburg, MD 20899-8900. Issued June, 2009.
-
(2009)
Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography
-
-
|