Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network
暂无分享,去创建一个
Jia Lu | Wang Feng | Ni Weichuan | Liu Shaojiang | Wan Zhiping | W. Feng | W. Zhiping | Ni Weichuan | Liu Shaojiang | Jia Lu
[1] Weihua Zhuang,et al. Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks , 2010, J. Commun..
[2] Weili Wu,et al. Maximizing rumor containment in social networks with constrained time , 2014, Social Network Analysis and Mining.
[3] Xiehua Yu. Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy , 2013, J. Networks.
[4] Sang-Ha Kim,et al. Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment , 2015, Telecommun. Syst..
[5] Anish Prasad Shrestha,et al. Kerberos based authentication for inter-domain roaming in wireless heterogeneous network , 2010, Comput. Math. Appl..
[6] Andrei V. Gurtov,et al. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.
[7] Mimoza Durresi,et al. Secure authentication in heterogeneous wireless networks , 2008, Mob. Inf. Syst..
[8] Liu Guang-qiang. Identity-based anonymity authentication protocol in the heterogeneous wireless network , 2011 .
[9] Jiannong Cao,et al. Trust-Based Fast Inter-Domain Secure Handoff over Heterogeneous Wireless Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[10] Bakkiam David Deebak. Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems , 2016, Wirel. Pers. Commun..
[11] Lei Li,et al. Energy-efficient resource allocation in heterogeneous network with cross-tier interference constraint , 2013, 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops).
[12] Mir-Kamran Mahshid,et al. An efficient and secure authentication for inter-roaming in wireless heterogeneous network , 2014, Social Network Analysis and Mining.
[13] Lina Zhu,et al. A random key management scheme for heterogeneous wireless sensor network , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[14] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.