Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks
暂无分享,去创建一个
Lei Tang | Xiaoyan Hong | Qunwei Zheng | Jun Liu | X. Hong | Qunwei Zheng | Lei Tang | Jun Liu
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Yuguang Fang,et al. Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] R. Radhakrishnan,et al. Simple Interference Cancellation Technique for Multicarrier DS-CDMA , 2007, Int. J. Bus. Data Commun. Netw..
[6] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Flávio Henrique Teles Vieira,et al. Providing Quality of Service to Computer Networks through Traffic Modeling : Improving the Estimation of Bandwidth and Data Loss Probability , 2010 .
[8] David Thomas,et al. The Art in Computer Programming , 2001 .
[9] Christos Gkantsidis,et al. An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[11] Pattarasinee Bhattarakosol. Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication , 2010 .
[12] Rainer Leupers,et al. Automatic Generation of Memory Interfaces for ASIPs , 2010, Int. J. Embed. Real Time Commun. Syst..
[13] Janelle J. Harms,et al. Performance study of a multipath routing method for wireless mobile ad hoc networks , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Tibor Dulai,et al. Advanced Communication Protocol Technologies: Solutions, Methods, and Applications , 2011 .
[16] Phan Cong-vinh. Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification , 2011 .
[17] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[18] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[19] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[20] P. M. Lee,et al. Random Walks and Random Environments: Volume 1: Random Walks , 1995 .
[21] Rabin K. Patra,et al. Routing in a delay tolerant network , 2004, SIGCOMM '04.
[22] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[23] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[24] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[25] Zygmunt J. Haas,et al. Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..
[26] Rainer Leupers,et al. Optimized Communication Architecture of MPSoCs with a Hardware Scheduler: A System-Level Analysis , 2011, Int. J. Embed. Real Time Commun. Syst..
[27] Chung-ming Huang,et al. Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications , 2009 .
[28] Kalle Lyytinen,et al. Telecommunications in transition: the Chinese experience in the international context , 2001 .
[29] Huaqun Guo. Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange , 2009 .
[30] Say Ying Lim,et al. Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers , 2009, Int. J. Bus. Data Commun. Netw..
[31] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[32] Samir Chatterjee,et al. International Journal of Business Data Communications and Networking , 2010 .
[33] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[34] Yogesk K. Dwivedi,et al. Reflecting Upon the Empirical Findings: Validating the Conceptual Model , 2008 .
[35] Ramesh Subramanian,et al. Peer to Peer Computing: The Evolution of a Disruptive Technology , 2005 .
[36] Beomjin Choi,et al. Building Enterprise Network Infrastructure for a Supermarket Store Chain , 2009, J. Cases Inf. Technol..
[37] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[38] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[39] R. Durrett. Random walks and random environments. Volume 1: Random walks , 1996 .
[40] Stavros Kotsopoulos,et al. Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms , 2008 .
[41] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[42] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[43] Teng-Wen Chang,et al. Vehicular System Management Architecture and Application Platform , 2010 .
[44] Anthony Ioannidis,et al. Converged Networks and Seamless Mobility: Lessons from Experience , 2009 .
[45] Li-Te Cheng,et al. Personal Peer-to-Peer Collaboration Based on Shared Objects , 2005 .