Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
暂无分享,去创建一个
[1] Seymour Stein,et al. Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..
[2] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[3] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Jian Sun,et al. A novel throughput optimization approach in wireless systems , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[6] Morris J. Dworkin,et al. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[7] David G. Messerschmitt,et al. The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.
[8] Rajarathnam Chandramouli,et al. Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[9] Nilufar Baghaei,et al. IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[10] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[11] Rajarathnam Chandramouli,et al. On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries , 2006, ACNS.
[12] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[13] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[14] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[15] A. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.
[16] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[17] Mohammed Boulmalf,et al. On the Impact of Security on the Performance of WLANs , 2007, J. Commun..