Optimization between security and delay of quality-of-service
暂无分享,去创建一个
Zhen Ji | Jianyong Chen | Huawang Zeng | Cunying Hu | Jianyong Chen | Huawang Zeng | Zhen Ji | Cunying Hu
[1] Zhen Ji,et al. A hybrid immune multiobjective optimization algorithm , 2010, Eur. J. Oper. Res..
[2] Stefan Lindskog,et al. Providing Tunable Security Services: An IEEE 802.11i Example , 2006, 2006 Securecomm and Workshops.
[3] Christian Callegari,et al. Security and delay issues in SIP systems , 2009 .
[4] H. Imai,et al. On the impact of security on latency in WLAN 802.11b , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[5] Dapeng Wu,et al. An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.
[6] Kai Wang,et al. Quality of protection analysis and performance modeling in IP multimedia subsystem , 2009, Comput. Commun..
[7] Marisol García-Valls,et al. QoS-Aware Real-Time Composition Algorithms for Service-Based Applications , 2009, IEEE Transactions on Industrial Informatics.
[8] Nelson L. S. da Fonseca. Fourth quarter 2009 IEEE communications surveys and tutorials , 2009 .
[9] Wei Qu,et al. IPSec-based secure wireless virtual private network , 2002, MILCOM 2002. Proceedings.
[10] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[11] Wei Liang,et al. On performance analysis of challenge/response based authentication in wireless networks , 2005, Comput. Networks.
[12] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[13] Wenye Wang,et al. On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility , 2007, Mob. Networks Appl..
[14] Wei Liang,et al. A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[15] Johnson P. Thomas,et al. Security and QoS Self-Optimization in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.
[16] Doru E. Tiliute. Security of Mobile ad-hoc Wireless Networks. A Brief Survey , 2007 .
[17] Stefan Lindskog,et al. Providing Tunable Security in IEEE 802.11i Enabled Networks , 2006 .
[18] Chao-Yang Lee,et al. A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..
[19] Jun Zhang,et al. Impact of Security on QoS in Communication Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[20] Brian L. Mark,et al. Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs , 2006, IEEE Transactions on Vehicular Technology.