1 |
I. F. Akyildiz, X. Wang, and W. Wang, 'Wireless mesh networks: a survey,' Computer Networks, 47(4):445-487, 2005
DOI
ScienceOn
|
2 |
A. Haq, A. Naveed, and S. S. Kanhere, 'Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks,' UNSW-CSE-TR-0622, 2006
|
3 |
Y.-Ch. Hu and A.Perrig, 'A Survey of Secure Wireless Ad Hoc Routing,' IEEE Security and Privacy, special issue on Making Wireless Work, vol 2, no. 3, 2004
|
4 |
A. Shamir, 'How to share a secret,' Communications of the ACM, 22(11):612-613, Nov. 1979
DOI
ScienceOn
|
5 |
Y. Desmedt and S. Jajodia, 'Redistributing secret shares to new access structures and its applications,' Technical Report ISSE TR-97-01, George Mason University, 1997
|
6 |
P. Feldman, 'A practical scheme for non-interactive verifiable secret sharing,' Proceedings of the 28th IEEE Annual Symposium on Foundations of Computer Science, pp. 427-437, Oct. 1987
|
7 |
S. Yi and R. Kravets, 'MOCA: mobile certificate authority for wireless ad hoc networks,' The 2nd Annual PKI Research Workshop (PKI' 03)
|
8 |
L. Zhou and Z. Haas, 'Securing ad hoc networks,' IEEE Network Magazine, 13(6):24-30, 1999
|
9 |
P. M. Ruiz and A. F. Gomez-Skarmeta, 'Heuristic algorithms for minimum bandwidth consumption multicast routing in wireless mesh networks,' Proceedings of ADHOC-NOW, pp. 258-270, 2005
|
10 |
S. Capkun, L. Buttyan, and J.-P. Hubaux, 'Self-organized public-key management for mobile ad hoc networks,'. IEEE Transactions on Mobile Computing, 2(1), 2003
|
11 |
W. Xu, W. Trappe, Y. Zhang, and T. Wood, 'The Feasibility of Launching and Detecting Jamming Attacks in Wireless. Networks,' Proceedings of MobiHoc, 2005
|
12 |
S. Yi and R. Kravets, 'Composite Key Management for Ad Hoc Networks,' Proceedings of MobiQuitous, 2004
|
13 |
T. M. Wong, C. Wang, and J. M. Wing, 'Verifiable secret redistribution for archive systems,' Proceedings of the First International IEEE Security in Storage Workshop (SISW 2002), Greenbelt, MD, Nov. 2002
|
14 |
Y. Zhang and Y. Fang, 'ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks,' IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, 2006
|
15 |
B. Wu, J. Wu, E. Fernandez, and S. Magliveras, 'Secure and efficient key management in mobile ad hoc wireless networks,' Proceedings of the 19th IEEE international parallel and distributed symposium (IPDPS 2005). The first international workshop on security in systems and networks (SSN 2005), p.288, 2005
|
16 |
A. Seshadri, A. Perrig, L. van Doom, and P. Khosla, 'SWATT: SoftWare-based Attestation for Embedded Devices', Proceedings of IEEE Symposim on Security and Privacy, 2004
|
17 |
N. Ben Salem and J.-P. Hubaux, 'Securing Wireless Mesh Networks,' IEEE Wireless Communications, 13(2):50-55, Apr. 2006
|