WLAN Mesh security association scheme in trusted computing environment
To solve the existing problems caused by that the third version of WLAN authentication infrastructure (WAI) protocol was used to establish WLAN Mesh security association, a WLAN Mesh security association scheme based on an improved WAI protocol was proposed. The results of performance analysis of th...
Saved in:
Main Authors: | Yue-lei XIAO, Yu-min WANG, Liao-jun PANG, Shi-chong TAN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.012/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Universally composable secure trusted access protocol for WLAN Mesh networks
by: MA Zhuo1, et al.
Published: (2008-01-01) -
Research of WLAN authentication in roaming environment with the trend of network integration
by: Zhang-zhe LIU, et al.
Published: (2012-09-01) -
Research on LTE-WLAN Radio Interworking
by: Fang Xie, et al.
Published: (2014-03-01) -
New extension method of trusted certificate chain in virtual platform environment
by: Liang TAN, et al.
Published: (2018-06-01) -
Trusted and anonymous authentication scheme for wireless networks
by: YANG Li1, et al.
Published: (2009-01-01)