-
1
-
-
84875683726
-
-
IEEE P802.11s D4.0 Draft Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking, December .
-
IEEE P802.11s D4.0 Draft Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking, December 2009.
-
(2009)
-
-
-
2
-
-
55849149445
-
-
Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. Conference Sensor Technologies and Applications, Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Conference, 25-31 Aug.
-
Harkins D. Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. Conference Sensor Technologies and Applications, Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Conference, 25-31 Aug. 2008; 839-844.
-
(2008)
, pp. 839-844
-
-
Harkins, D.1
-
3
-
-
84875662009
-
-
IETF RFC 3561. Ad hoc on-demand distance vector (AODV) routing, July .
-
Perkins C, Belding-Royer E, Das S. IETF RFC 3561. Ad hoc on-demand distance vector (AODV) routing, July 2003.
-
(2003)
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
4
-
-
85164895199
-
-
An efficient authenticated key establishment scheme for wireless mesh networks. GLOBECOM 2010, IEEE Global Telecommunications Conference.
-
He B, Joshi S, Agrawal DP, Sun D. An efficient authenticated key establishment scheme for wireless mesh networks. GLOBECOM 2010, IEEE Global Telecommunications Conference.
-
-
-
He, B.1
Joshi, S.2
Agrawal, D.P.3
Sun, D.4
-
5
-
-
34347349933
-
-
Ad-hoc on-demand distance vector routing. 2nd IEEE workshop on mobile computing systems and applications
-
Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. 2nd IEEE workshop on mobile computing systems and applications, 1999; 90-100.
-
(1999)
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
7
-
-
11244269535
-
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu Y-C, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1):175-192.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
9
-
-
0041973497
-
Packet leashes: a defense against wormhole attacks in wireless networks
-
In, INFOCOM 2003, San Francisco, April
-
Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2003, San Francisco, April 2003; 1976-1986.
-
(2003)
Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
76649132289
-
SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
-
In, LNCS 5730, Gavrilova ML, Tan CJK (eds). Springer-Verlag: Berlin Heidelberg
-
Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. In Transactions on Computer Science VI, LNCS 5730, Gavrilova ML, Tan CJK (eds). Springer-Verlag: Berlin Heidelberg, 2009; 95-114.
-
(2009)
Transactions on Computer Science VI
, pp. 95-114
-
-
Islam, M.S.1
Hamid, M.A.2
Hong, C.S.3
-
11
-
-
80052151562
-
-
On securing HWMP using IBC. Proceedings of IEEE ICC, Kyoto Japan
-
Ben-othman J, Saavedra Benitez YI. On securing HWMP using IBC. Proceedings of IEEE ICC, Kyoto Japan, 2011.
-
(2011)
-
-
Ben-othman, J.1
Saavedra Benitez, Y.I.2
-
12
-
-
84875641681
-
-
IBC-HWMP: a novel secure identity-based cryptography based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience. Article first published online: 19 Aug. 2011.
-
Ben-othman J, Saavedra Benitez YI. IBC-HWMP: a novel secure identity-based cryptography based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience. Article first published online: 19 Aug. 2011.
-
-
-
Ben-othman, J.1
Saavedra Benitez, Y.I.2
-
13
-
-
84857201103
-
-
Performance comparison between IBC-HWMP and Hash-HWMP. IEEE GLOBECOM, Houston, Texas, USA, 5-9 December
-
Ben-othman J, Mokdad L, Saavedra Benitez YI. Performance comparison between IBC-HWMP and Hash-HWMP. IEEE GLOBECOM, Houston, Texas, USA, 5-9 December 2011; 67-71.
-
(2011)
, pp. 67-71
-
-
Ben-othman, J.1
Mokdad, L.2
Saavedra Benitez, Y.I.3
-
14
-
-
84856185933
-
-
A light weight security scheme for HWMP protocol using elliptic curve technique. Wireless Local Networks, Berlin, Germany, 3-7 October .
-
Ben-othman J, Saavedra Benitez YI. A light weight security scheme for HWMP protocol using elliptic curve technique. Wireless Local Networks, Berlin, Germany, 3-7 October 2011.
-
(2011)
-
-
Ben-othman, J.1
Saavedra Benitez, Y.I.2
-
15
-
-
84871989373
-
-
A novel mechanism to secure internal attacks in HWMP routing protocol. IEEE ICC 2012 Ad-hoc and Sensor Networking Symposium, Ottawa, Canada, June 12
-
Ben-othman J, Claude JP, Saavedra Benitez YI. A novel mechanism to secure internal attacks in HWMP routing protocol. IEEE ICC 2012 Ad-hoc and Sensor Networking Symposium, Ottawa, Canada, June 12, 2012; 162-166.
-
(2012)
, pp. 162-166
-
-
Ben-othman, J.1
Claude, J.P.2
Saavedra Benitez, Y.I.3
-
16
-
-
84875646268
-
-
National Institute for Standards and Technology. Digital Signature Standard (DSS), Technical Report 168, January .
-
National Institute for Standards and Technology. Digital Signature Standard (DSS), Technical Report 168, January 2000.
-
(2000)
-
-
-
19
-
-
84875659260
-
-
FIPS PUB 186-3. Federal information processing standards publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology, Gaithersburg, MD 20899-8900, Issued June
-
FIPS PUB 186-3. Federal information processing standards publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology, Gaithersburg, MD 20899-8900, Issued June, 2009.
-
(2009)
-
-
-
20
-
-
84875647254
-
-
Elliptic Curves and Cryptography. Dr. Dobbs Journal, No. 264, April .
-
Jurisic A, Menezes AJ. Elliptic Curves and Cryptography. Dr. Dobbs Journal, No. 264, April 1997.
-
(1997)
-
-
Jurisic, A.1
Menezes, A.J.2
-
21
-
-
84874324906
-
Identity based encryption from the Weil Pairing
-
Boneh D, Franklin MK. Identity based encryption from the Weil Pairing. In Proceeding of Crypto. 2001; 213-219.
-
(2001)
Proceeding of Crypto
, pp. 213-219
-
-
Boneh, D.1
Franklin, M.K.2
-
22
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Shamir A. Identity based cryptosystems and signature schemes. In Proceeding of Crypto. 1984; 47-53.
-
(1984)
Proceeding of Crypto
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
77950151506
-
An identity based encrytion scheme based on quadratic residues
-
2260, Springer-Verlag, ISBN:3-540-43026-1
-
Cocks C. An identity based encrytion scheme based on quadratic residues. In Proceeding of the 8th International Conference on Cryptography and Coding, Vol. 2260, Springer-Verlag, 2001; 360-363. ISBN:3-540-43026-1, http://dl.acm.org/citation.cfm?id=742435
-
(2001)
Proceeding of the 8th International Conference on Cryptography and Coding
, pp. 360-363
-
-
Cocks, C.1
-
24
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer-Verlag
-
Hess F. Efficient identity based signature schemes based on pairings. In Annual International Workshop on Selected Areas in Cryptography. Springer-Verlag, 2003; 310-324, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.1482, http://link.springer.com/content/pdf/10.1007%2F3-540-36492-7_20
-
(2003)
Annual International Workshop on Selected Areas in Cryptography
, pp. 310-324
-
-
Hess, F.1
-
25
-
-
55849149445
-
-
Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. SENSORCOMM. Conference Sensor Technologies and Applications, Aug. .
-
Harkins D. Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. SENSORCOMM. Conference Sensor Technologies and Applications, Aug. 2008.
-
(2008)
-
-
Harkins, D.1
-
26
-
-
84875670162
-
-
The network simulator v. 3 (ns-3).
-
The network simulator v. 3 (ns-3).
-
-
-
|