A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
暂无分享,去创建一个
Xin Jiang | Chen Yang | Yanhua Liu | Mingzhe Liu | Ruili Wang | Ruili Wang | Mingzhe Liu | Xin Jiang | Chen Yang | Yanhua Liu
[1] Iftekhar Hussain,et al. An Efficient TDMA MAC Protocol for Multi-hop WiFi-Based Long Distance Networks , 2016, Wirel. Pers. Commun..
[2] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Mohsen Guizani,et al. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.
[5] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[6] Arjuna Sathiaseelan,et al. Software-defined wireless mesh networks for internet access sharing , 2015, Comput. Networks.
[7] Kun Yang,et al. A Security Sandbox Approach of Android Based on Hook Mechanism , 2018, Secur. Commun. Networks.
[8] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Ulrike Meyer,et al. Experiences from security research using a Wireless Mesh Network testbed , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[10] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[11] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[12] Hideaki Goto,et al. Easy-to-Deploy Wireless Mesh Network System with User Authentication and WLAN Roaming Features , 2017, IEICE Trans. Inf. Syst..
[13] Gonzalo Joya,et al. Peer selection in P2P wireless mesh networks: comparison of different strategies , 2015, Soft Comput..
[14] Brahim Bensaou,et al. Throughput optimization in wireless local networks with inter-AP interference via a joint-association control, rate control, and contention resolution , 2014, Ad Hoc Networks.
[15] Lawrence Wai-Choong Wong,et al. A Network Resource Management Framework for Wireless Mesh Networks , 2017, Wirel. Pers. Commun..
[16] Leandros Tassiulas,et al. Video-Aware Multicast Opportunistic Routing Over 802.11 Two-Hop Mesh Networks , 2017, IEEE Trans. Veh. Technol..
[17] Abhishek Majumder,et al. Implementation of enhanced forward pointer-based mobility management scheme for handling internet and intranet traffic in wireless mesh network , 2017, Telecommun. Syst..
[18] Shen Noether,et al. Ring Confidential Transactions , 2016, Ledger.
[19] Hamed Shariffar. SHA1 and SHA256 custom instruction design and characterization on Nios II processor , 2012 .
[20] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[21] Hu Junru. The improved elliptic curve digital signature algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[22] Xun Wang,et al. Review on mining data from multiple data sources , 2018, Pattern Recognit. Lett..
[23] Hans Dobbertin,et al. RIPEMD with two-round compress function is not collision-free , 1997, Journal of Cryptology.
[24] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[25] Catherine H. Gebotys,et al. Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals , 2009, 2009 International Conference on Reconfigurable Computing and FPGAs.
[26] Lawrence Wai-Choong Wong,et al. Optimal Association in Wireless Mesh Networks , 2015, IEEE Transactions on Vehicular Technology.
[27] Xiaoheng Deng,et al. Performance Analysis for IEEE 802.11s Wireless Mesh Network in Smart Grid , 2017, Wirel. Pers. Commun..
[28] Chao Yuan,et al. Research on a New Signature Scheme on Blockchain , 2017, Secur. Commun. Networks.
[29] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[30] Manuel Blum,et al. Noninteractive Zero-Knowledge , 1991, SIAM J. Comput..