References
- I. F. Akyildiz, X. Wang, and W. Wang, 'Wireless mesh networks: a survey,' Computer Networks, 47(4):445-487, 2005 https://doi.org/10.1016/j.comnet.2004.12.001
- S. Yi and R. Kravets, 'MOCA: mobile certificate authority for wireless ad hoc networks,' The 2nd Annual PKI Research Workshop (PKI' 03)
- B. Wu, J. Wu, E. Fernandez, and S. Magliveras, 'Secure and efficient key management in mobile ad hoc wireless networks,' Proceedings of the 19th IEEE international parallel and distributed symposium (IPDPS 2005). The first international workshop on security in systems and networks (SSN 2005), p.288, 2005
- P. M. Ruiz and A. F. Gomez-Skarmeta, 'Heuristic algorithms for minimum bandwidth consumption multicast routing in wireless mesh networks,' Proceedings of ADHOC-NOW, pp. 258-270, 2005
- N. Ben Salem and J.-P. Hubaux, 'Securing Wireless Mesh Networks,' IEEE Wireless Communications, 13(2):50-55, Apr. 2006
- A. Seshadri, A. Perrig, L. van Doom, and P. Khosla, 'SWATT: SoftWare-based Attestation for Embedded Devices', Proceedings of IEEE Symposim on Security and Privacy, 2004
- A. Haq, A. Naveed, and S. S. Kanhere, 'Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks,' UNSW-CSE-TR-0622, 2006
- Y.-Ch. Hu and A.Perrig, 'A Survey of Secure Wireless Ad Hoc Routing,' IEEE Security and Privacy, special issue on Making Wireless Work, vol 2, no. 3, 2004
- W. Xu, W. Trappe, Y. Zhang, and T. Wood, 'The Feasibility of Launching and Detecting Jamming Attacks in Wireless. Networks,' Proceedings of MobiHoc, 2005
- S. Capkun, L. Buttyan, and J.-P. Hubaux, 'Self-organized public-key management for mobile ad hoc networks,'. IEEE Transactions on Mobile Computing, 2(1), 2003
- L. Zhou and Z. Haas, 'Securing ad hoc networks,' IEEE Network Magazine, 13(6):24-30, 1999
- S. Yi and R. Kravets, 'Composite Key Management for Ad Hoc Networks,' Proceedings of MobiQuitous, 2004
- Y. Zhang and Y. Fang, 'ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks,' IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, 2006
- A. Shamir, 'How to share a secret,' Communications of the ACM, 22(11):612-613, Nov. 1979 https://doi.org/10.1145/359168.359176
- Y. Desmedt and S. Jajodia, 'Redistributing secret shares to new access structures and its applications,' Technical Report ISSE TR-97-01, George Mason University, 1997
- P. Feldman, 'A practical scheme for non-interactive verifiable secret sharing,' Proceedings of the 28th IEEE Annual Symposium on Foundations of Computer Science, pp. 427-437, Oct. 1987
- T. M. Wong, C. Wang, and J. M. Wing, 'Verifiable secret redistribution for archive systems,' Proceedings of the First International IEEE Security in Storage Workshop (SISW 2002), Greenbelt, MD, Nov. 2002