Author:
Rathee Geetanjali,Saini Hemraj
Reference11 articles.
1. Xudong Wang. A survey on wireless mesh networks;Akyildiz;IEEE conference on Communications Magazine,2005
2. A. A. Franklin and C. S. R. Murthy. An introduction to wireless mesh networks. Security in Wireless Mesh Networks(book chapter), CRC Press,USA; 2007.
3. Hubaux, J.-P.:Securing Wireless Mesh Networks;Ben Salem;IEEE Wireless Communication,2006
4. Amir, Yair, et al. Fast handoff for seamless wireless mesh networks.Proceedings of the 4th international conference on Mobile systems, applications and services. ACM, 2006.
5. Draves, Richard, Jitendra Padhye, and Brian Zill. Routing in multi-radio, multi-hop wireless mesh networks. Proceedings of the 10th annual international conference on Mobile computing and networking. ACM, 2004.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Challenges During Handoff Authentication Operation for Wireless Mesh Network;Lecture Notes in Electrical Engineering;2023
2. Enhanced security using proxy signcryption technique for wireless mesh networks;International Journal of System Assurance Engineering and Management;2022-12-21
3. Fast handoff authentication of client in wireless mesh network;2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2022-12-16
4. Handoff Authentication Through Diffie-Hellman Approach for Wireless Mesh Networks;Proceedings of the International Conference on Computing and Communication Systems;2021
5. Handoff Schemes in Mobile Environments;International Journal of Service Science, Management, Engineering, and Technology;2020-01