Citation: | FU Ying-fang, HE Jing-sha, LUAN Liang-yu, WANG Rong, LI Guo-rui. A Distributed Key Management Scheme for Wireless Mesh Networks[J]. Journal of Beijing University of Technology, 2009, 35(3): 403-408. |
[1] |
方旭民.下一代无线因特网技术:无线Mesh网络[M].北京:人民邮电出版社,2006.
|
[2] |
SALEM N,HUBAUX J.Securing wireless mesh networks[J].IEEE Wireless Communications,2006,13(2):50-55.
|
[3] |
Group of the LAN/MAN Committee.IEEE draft amendment to standard for information technology-telecommunications and information exchange between systems-LAN/MAN specific requirements-part 11:wireless medium access control(MAC)and physical layer(PHY)specifications:amendment:ESS mesh networking,IEEE 802.11s/D1.0[EB/OL].[2007-03-10]. http://ieeexplore.ieee.org/Xplore/defdeny.jsp?url=/ielD/4278905/4278906/04278907.pdf.
|
[4] |
KHALILI A,KATZ J,ARBAUGH W A.Toward secure key distribution in truly Ad-Hoc networks[C]//Soc JAPAN. Symposium on Applications and the Internet Workshops.Florida,USA:IEEE Computer Soc,2003:342-346.
|
[5] |
SHAMIR A.How to share a secret[J].CACM,1979,24(11):612-613.
|
[6] |
龙华.OPNET Modeler与计算机网络仿真[M].西安:西安电子科技大学出版社,2006.
|
[7] |
陈敏.OPNET网络仿真[M].北京:清华大学出版社,2004.
|
[8] |
李馨,叶明.OPNET Modeler网络建模与仿真[M].西安:西安电子科技大学出版社,2005.
|
[1] | WU Zhijun, NIU Fangchao, PAN Deng, LEI Jin. Authority for SWIM Based on Attribute Encryption[J]. Journal of Beijing University of Technology, 2017, 43(3): 350-357. DOI: 10.11936/bjutxb2015090051 |
[2] | YE Shaozhen, CHEN Liqing. Searchable Attribute-based Encryption Access Control Scheme[J]. Journal of Beijing University of Technology, 2016, 42(8): 1160-1166. DOI: 10.11936/bjutxb2015080017 |
[3] | ZHOU Dawei, WEI Guoheng, ZHANG Huanguo. Key-management Scheme Based on Public-key Institution to Clustered Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2016, 42(5): 707-712. DOI: 10.11936/bjutxb2015070081 |
[4] | HAN Lei, LIU Ji-qiang, WEI Xue-ye, HOU Jie. Application Research on Key Management of Ad Hoc Network Based on PTPM[J]. Journal of Beijing University of Technology, 2012, 38(11): 1676-1682. |
[5] | ZHANG Han, ZHANG Jian-biao, ZHANG Tao. Certificate Distribution Deposition Model Based on DHT Network[J]. Journal of Beijing University of Technology, 2012, 38(3): 385-389. |
[6] | HU Jin, HE De-biao, CHEN Jian-hua, HUANG Yin. Public-key Cryptosystem Based on Elliptic Curve Isogenies[J]. Journal of Beijing University of Technology, 2011, 37(6): 916-920. |
[7] | SHI Wei-min. Enhanced Identity-based Deniable Authentication Protocol[J]. Journal of Beijing University of Technology, 2011, 37(3): 477-480. |
[8] | ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688. |
[9] | SHI Wei-min. An Improved Scheme of LeeB Secure Key Issuing Protocol[J]. Journal of Beijing University of Technology, 2010, 36(3): 401-404. |
[10] | CAI Yong-quan, XIAO Chuang-bo. Security Frame of Private Key Certificate Based on Attribute and Its Realization[J]. Journal of Beijing University of Technology, 2004, 30(1): 68-70. |