Network security: design, analysis and tradeoff evaluation
暂无分享,去创建一个
[1] Yang Xiao,et al. Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..
[2] Yang Xiao,et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, PAPER ID: TPDS-0307-0605.R1 1 Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks , 2022 .
[3] G. Racherla,et al. Ultra-wideband systems for data communications , 2002, 2002 IEEE International Conference on Personal Wireless Communications.
[4] Yang Xiao. IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms , 2005, IEEE Transactions on Wireless Communications.
[5] Sang Lyul Min,et al. Caller Identification System in the Internet Environment , 1993 .
[6] Harald Niederreiter,et al. Introduction to finite fields and their applications: List of Symbols , 1986 .
[7] Yang Xiao,et al. A Lightweight Secure Solution for RFID. , 2006 .
[8] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[9] Xiaojiang Du,et al. Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[10] Yang Xiao,et al. Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003, MOCO.
[11] Edward W. Knightly,et al. Opportunistic media access for multirate ad hoc networks , 2002, MobiCom '02.
[12] Songwu Lu,et al. PEAS: a robust energy conserving protocol for long-lived sensor networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[13] Xin Chen,et al. Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[14] Miodrag Potkonjak,et al. Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[15] Yang Xiao,et al. Efficient MAC strategies for the IEEE 802.11n wireless LANs , 2006, Wirel. Commun. Mob. Comput..
[16] David Thomas,et al. The Art in Computer Programming , 2001 .
[17] Lih-Yuan Deng,et al. Efficient and portable multiple recursive generators of large order , 2005, TOMC.
[18] Weihua Zhuang,et al. Medium access control in ultra-wideband wireless networks , 2005, IEEE Transactions on Vehicular Technology.
[19] Yang Xiao,et al. Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems , 2006, IEEE Journal on Selected Areas in Communications.
[20] Yang Xiao,et al. Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..
[21] Li Liu,et al. A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.
[22] David Malone,et al. Aggregation With Fragment Retransmission for Very High-Speed WLANs , 2009, IEEE/ACM Transactions on Networking.
[23] Mingyan Liu,et al. Network coverage using low duty-cycled sensors: random & coordinated sleep algorithms , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[24] Ying Zhang,et al. Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[25] Mani B. Srivastava,et al. Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[26] Jan Brinkhuis,et al. Optimization Insights and Applications , 2010 .
[27] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[28] P. K. Sahoo,et al. Mean Value Theorems and Functional Equations , 1998 .
[29] J. Tourrilhes. Packet frame grouping: improving IP multimedia performance over CSMA/CA , 1998, ICUPC '98. IEEE 1998 International Conference on Universal Personal Communications. Conference Proceedings (Cat. No.98TH8384).
[30] Sync TGn. TGn Sync Proposal Technical Specification , 2004 .
[31] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[32] Sunghyun Choi,et al. EBA: an enhancement of the IEEE 802.11 DCF via distributed reservation , 2005, IEEE Transactions on Mobile Computing.
[33] Xiaojiang Du,et al. Weaving a Proper Net to Catch Large Objects , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[34] R. J. Lopez. An Implicit Function , 1994 .
[35] Dennis K. J. Lin,et al. Random Number Generation for the New Century , 2000 .
[36] Tian He,et al. Differentiated surveillance for sensor networks , 2003, SenSys '03.
[37] G. Marsaglia,et al. Fast Generation of Discrete Random Variables , 2004 .
[38] Nitin H. Vaidya,et al. A wireless MAC protocol using implicit pipelining , 2006, IEEE Transactions on Mobile Computing.
[39] Yang Xiao,et al. A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..
[40] Hsiao-Hwa Chen,et al. IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs , 2008, IEEE Wireless Communications.
[41] Yang Xiao,et al. Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs , 2009, 2009 IEEE International Conference on Communications.
[42] Huaping Liu,et al. Ultra-wideband for multiple access communications , 2005, IEEE Communications Magazine.
[43] Ieee . Wg. Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .
[44] Yang Xiao,et al. Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.
[45] Fei Hu,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .
[46] Yang Xiao,et al. A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks , 2006, Mob. Networks Appl..
[47] Xi Chen,et al. An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks , 2006, Comput. Commun..
[48] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[49] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[50] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[51] Lih-Yuan Deng,et al. Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients , 2008 .
[52] Di Tian,et al. A coverage-preserving node scheduling scheme for large wireless sensor networks , 2002, WSNA '02.
[53] Yang Xiao,et al. A Lightweight Block Cipher Based on a Multiple Recursive Generator , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[54] Xiaojiang Du,et al. An Optimal Sensor Network for Intrusion Detection , 2009, 2009 IEEE International Conference on Communications.
[55] Kin K. Leung,et al. On optimizing backoff counter reservation and classifying stations for the IEEE 802.11 distributed wireless LANs , 2006, IEEE Transactions on Parallel and Distributed Systems.
[56] W. H. Payne,et al. Coding the Lehmer pseudo-random number generator , 1969, CACM.
[57] E. Watson. Primitive Polynomials (Mod 2) , 1962 .
[58] Ashish Goel,et al. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks , 2003, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[59] Yang Xiao,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..
[60] Yang Xiao,et al. Optimization between AES security and performance for IEEE 802.15.3 WPAN , 2009, IEEE Transactions on Wireless Communications.
[61] Kang-Won Lee,et al. Traffic analysis in anonymous MANETs , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[62] Hisashi Kobayashi,et al. Modeling and analysis , 1978 .
[63] David Malone,et al. A new MAC scheme for very high-speed WLANs , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[64] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[65] Yang Xiao,et al. IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.
[66] V. Vitsas,et al. Enhancing performance of the IEEE 802.11 distributed coordination function via packet bursting , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..
[67] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[68] Yang Xiao,et al. Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[69] Lih-Yuan Deng,et al. A system of high-dimensional, efficient, long-cycle and portable uniform random number generators , 2003, TOMC.
[70] Yang Xiao,et al. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.
[71] Thierry Turletti,et al. Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[72] Pierre L'Ecuyer,et al. Bad Lattice Structures for Vectors of Nonsuccessive Values Produced by Some Linear Recurrences , 1997, INFORMS J. Comput..
[73] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[74] Bo Sun,et al. Performance Analysis of Advanced Encryption Standard (AES). , 2006 .
[75] Granino A. Korn,et al. Mathematical handbook for scientists and engineers. Definitions, theorems, and formulas for reference and review , 1968 .