An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds
暂无分享,去创建一个
Chen Yang | Ala Altaweel | Radu Stoleru | Subhajit Mandal | R. Stoleru | ChenKuang Yang | A. Altaweel | Subhajit Mandal
[1] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] J. Wenny Rahayu,et al. Mobile Crowd Computing with Work Stealing , 2012, 2012 15th International Conference on Network-Based Information Systems.
[4] Frank Harary,et al. Graph Theory , 2016 .
[5] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[6] Kamal Jain. A Factor 2 Approximation Algorithm for the Generalized Steiner Network Problem , 2001, Comb..
[7] Minghua Chen,et al. Routing for security in networks with adversarial nodes , 2013, 2013 International Symposium on Network Coding (NetCod).
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] J. Wenny Rahayu,et al. Dynamic Mobile Cloud Computing: Ad Hoc and Opportunistic Job Sharing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[10] Taieb Znati,et al. Path key establishment using multiple secured paths in wireless sensor networks , 2005, CoNEXT '05.
[11] Yuguang Fang,et al. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .
[12] Leandros Tassiulas,et al. Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing , 2013, ACM Interational Symposium on Mobile Ad Hoc Networking and Computing.
[13] Gábor Csárdi,et al. The igraph software package for complex network research , 2006 .
[14] Ala Altaweel,et al. On secure shared key establishment for mobile devices using contextual information , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Wei-Tsung Su,et al. Mobile cloud with smart offloading system , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).
[17] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[18] Emina Soljanin,et al. Secure Network Coding for Wiretap Networks of Type II , 2009, IEEE Transactions on Information Theory.
[19] Gerardo Rubino,et al. Network design with node connectivity constraints , 2003, LANC '03.
[20] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[21] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[22] Chris J. Mitchell,et al. Key storage in secure networks , 1988, Discret. Appl. Math..
[23] .K Dhanya,et al. A Virtual Cloud Computing Provider for Mobile Devices , 2017 .
[24] Geoffrey G. Xie,et al. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud , 2015, IEEE Transactions on Cloud Computing.
[25] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[26] Ning Cai,et al. Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.
[27] Geoffrey G. Xie,et al. Energy-efficient fault-tolerant data storage & processing in dynamic networks , 2013, MobiHoc.
[28] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[29] Cengis Hasan,et al. 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .
[30] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[31] Taieb Znati,et al. End-to-end pairwise key establishment using multi-path in wireless sensor network , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..