Secured Identity Based Routing and privacy preservation in Wireless Mesh Networks
暂无分享,去创建一个
[1] Sajal K. Das,et al. Security Issues in Wireless Mesh Networks , 2008 .
[2] Syed Obaid Amin,et al. MHRP: A Secure Multi-Path Hybrid Routing Protocol for Wireless Mesh Network , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[4] William Stallings,et al. Network Security Essentials , 1999 .
[5] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Pin-Han Ho,et al. TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks , 2008, IEEE Transactions on Wireless Communications.
[7] Jean-Pierre Hubaux,et al. Securing wireless mesh networks , 2006, IEEE Wireless Communications.
[8] Robert H. Deng,et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.
[9] Yue Wu,et al. Security in Wireless Mesh Networks: Challenges and Solutions , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[10] Pin-Han Ho,et al. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.
[11] Choong Seon Hong,et al. An Efficient Mechanism for Network Management in Wireless Mesh Network , 2008, 2008 10th International Conference on Advanced Communication Technology.
[12] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[13] Günther Horn,et al. Authentication protocols for mobile network environment value-added services , 2002, IEEE Trans. Veh. Technol..
[14] HuntRay,et al. A taxonomy of network and computer attacks , 2005 .
[15] Wenjing Lou,et al. Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability , 2007, Mob. Networks Appl..
[16] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[17] Kui Ren,et al. On Address Privacy in Mobile Ad Hoc Networks , 2009, Mob. Networks Appl..
[18] Yuan Xue,et al. Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).