An integrated architecture for multi-hop infrastructure wireless networks
暂无分享,去创建一个
[1] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[2] P. Kumar,et al. Capacity of Ad Hoc Wireless Networks , 2002 .
[3] William A. Arbaugh,et al. Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.
[4] Jiro Yamakita,et al. Performance analysis of backoff algorithms under unsaturated conditions , 2005 .
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[7] B. Feldman,et al. Self-organizing security scheme for multi-hop wireless access networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[8] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[9] Amotz Bar-Noy,et al. Tracking mobile users in wireless communications networks , 1993, IEEE Trans. Inf. Theory.
[10] Yitzhak Birk,et al. Using direction and elapsed-time information to reduce the wireless cost of locating mobile units in cellular networks , 1995, Wirel. Networks.
[11] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Ahmet M. Eskicioglu,et al. Multilayer multicast key management with threshold cryptography , 2004, IS&T/SPIE Electronic Imaging.
[14] Yanghee Choi,et al. Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model , 2002, PWC.
[15] J. J. Garcia-Luna-Aceves,et al. Delay analysis of IEEE 802.11 in single-hop networks , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[16] Yu Wang,et al. Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[17] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[18] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[19] Donald F. Towsley,et al. On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Shugong Xu,et al. Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? , 2001, IEEE Commun. Mag..
[21] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[22] C. D. Litton,et al. A First Course in Bulk Queues , 1983 .
[23] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[24] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[25] David Hutchison,et al. Decentralised group key management , 2002 .
[26] G. Varghese,et al. An exercise in formal reasoning about mobile communications , 1998, Proceedings Ninth International Workshop on Software Specification and Design.
[27] L. Dondeti,et al. A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .
[28] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[29] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[30] Randy H. Katz,et al. Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..
[31] K. Baughan,et al. Visions of 4G , 2000 .
[32] Ying-Dar Lin,et al. Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[33] Kevin R. Fall,et al. The NS Manual (Formerly NS Notes and Documentation , 2002 .
[34] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[35] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[36] Bob Briscoe. MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .
[37] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[38] Lin Wu,et al. Performance Analysis of CSMA and BTMA Protocols in Multihop Networks (II), Multiple Channel Case , 1999, Inf. Sci..
[39] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[40] Yanghee Choi,et al. FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN , 2002 .
[41] Edward W. Knightly,et al. End-to-end performance and fairness in multihop wireless backhaul networks , 2004, MobiCom '04.
[42] Yan Gao,et al. The fundamental role of hop distance in IEEE 802.11 multi-hop ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[43] Biplab Sikdar,et al. Queueing analysis and delay mitigation in IEEE 802.11 random access MAC based wireless networks , 2004, IEEE INFOCOM 2004.
[44] Roberto Battiti,et al. Analysis of the IEEE 802.11 DCF with Service Differentiation Support in Non-saturation Conditions , 2004, QofIS.
[45] Gene Tsudik,et al. Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.
[46] Ashok Samal,et al. Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..
[47] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[48] M. L. Chaudhry,et al. A first course in bulk queues , 1983 .
[49] Nitin H. Vaidya,et al. A Hybrid Network Implementation to Extend Infrastructure Reach , 2003 .
[50] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[51] J. J. Garcia-Luna-Aceves,et al. A scalable model for channel access protocols in multihop ad hoc networks , 2004, MobiCom '04.
[52] Jun He. Performance modeling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[53] Leandros Tassiulas,et al. Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.
[54] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[55] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[56] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.