暂无分享,去创建一个
[1] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[3] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[4] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[5] Rajarathnam Chandramouli,et al. On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries , 2006, ACNS.
[6] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[7] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[8] Nilufar Baghaei,et al. IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[9] Seymour Stein,et al. Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..
[10] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[11] Jian Sun,et al. A novel throughput optimization approach in wireless systems , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[12] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[13] Kazukuni Kobara,et al. On the Impact of Security on the Latency in WLAN 802.11b: Analytical Study , 2005 .
[14] P. Krishnamurthy,et al. Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[15] A. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.
[16] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[17] Mohammed Boulmalf,et al. On the Impact of Security on the Performance of WLANs , 2007, J. Commun..
[18] David G. Messerschmitt,et al. The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.
[19] Rajarathnam Chandramouli,et al. Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[20] H. Imai,et al. On the impact of security on latency in WLAN 802.11b , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..