메뉴 건너뛰기




Volumn , Issue , 2017, Pages 269-276

Secure-GLOR: An adaptive secure routing protocol for dynamic wireless mesh networks

Author keywords

Geo Location Oriented Routing (GLOR); Secure Mesh Networks; Secure GLOR; Smart Device Network

Indexed keywords

BIG DATA; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; DATA PRIVACY; EMBEDDED SOFTWARE; EMBEDDED SYSTEMS; INTERNET PROTOCOLS; MESH GENERATION; MESH NETWORKING; NETWORK PROTOCOLS; NETWORK ROUTING; ROUTING PROTOCOLS; WIRELESS MESH NETWORKS (WMN);

EID: 85032289155     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.247     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 2
    • 84920549099 scopus 로고    scopus 로고
    • Automatic android-based wireless mesh networks
    • P. Wong, V. Varikota, D. Nguyen, and A. Abukmail. "Automatic android-based wireless mesh networks." Informatica 38, no. 4 (2014): 313
    • (2014) Informatica , vol.38 , Issue.4 , pp. 313
    • Wong, P.1    Varikota, V.2    Nguyen, D.3    Abukmail, A.4
  • 4
    • 85032361720 scopus 로고    scopus 로고
    • 'Opengarden',[Accessed : 19-May-2015]
    • 'Opengarden'. [Online]. Available: https://opengarden.com. [Accessed : 19-May-2015]
  • 10
    • 0342435692 scopus 로고
    • A proposed standard format for RSA cryptosystems
    • P. Zimmermann. "A proposed standard format for RSA cryptosystems." IEEE Computer 19, no. 9 (1986): 21-34
    • (1986) IEEE Computer , vol.19 , Issue.9 , pp. 21-34
    • Zimmermann, P.1
  • 12
    • 73649145526 scopus 로고    scopus 로고
    • Advanced encryption standard (aes)
    • S. Heron. "Advanced Encryption Standard (AES). "Network Security, 2009(12), pp. 8-12, 2009
    • Network Security , vol.2009 , Issue.12 , pp. 8-12
    • Heron, S.1
  • 13
    • 85008884270 scopus 로고    scopus 로고
    • DLSeF: A dynamic key length based efficient real-time security verification model for big data stream
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen. "DLSeF: A Dynamic Key Length based Efficient Real-Time Security Verification Model for Big Data Stream." ACM Transactions on Embedded Computing Systems, Vol. 16(2), 2017
    • (2017) ACM Transactions on Embedded Computing Systems , vol.16 , Issue.2
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 14
    • 85031107997 scopus 로고    scopus 로고
    • SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
    • D. Puthal, X. Wu, S. Nepal, R. Ranjan, and J. Chen, "SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams." IEEE Transactions on Big Data, 2017
    • (2017) IEEE Transactions on Big Data
    • Puthal, D.1    Wu, X.2    Nepal, S.3    Ranjan, R.4    Chen, J.5
  • 16
    • 84978224275 scopus 로고    scopus 로고
    • Threats to networking cloud and edge datacenters in the internet of things
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen. "Threats to Networking Cloud and Edge Datacenters in the Internet of Things." IEEE Cloud Computing. Vol. 3(3), pp. 64-71, 2016
    • (2016) IEEE Cloud Computing , vol.3 , Issue.3 , pp. 64-71
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 20
    • 85018285065 scopus 로고    scopus 로고
    • Private matching and set intersection computation in multi-agent and industrial control systems
    • A. Rasheed, et al. "Private matching and set intersection computation in multi-agent and industrial control systems." In 12th Annual Conference on Cyber and Information Security Research, p. 14, 2017
    • (2017) 12th Annual Conference on Cyber and Information Security Research , pp. 14
    • Rasheed, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.