[1].“A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems”,Journal of Supercomputing,2011年7月,(SCI检索) [2].“Analysis and application of EAP-AKA for IEEE standard 802.16e”,Wicom 2011,2011年9月,(EI核心检索) [3].“Comparision Analysis on TEK Exchange between PKMv1 and PKMv2 for Wimax”,2011年7月,(EI核心检索) [4].“An EAP_TTLS_SPEKEY Method for Single EAP_Based Auth Mode of IEEE 802.16e PKMv2”,IEEE Catalog Number:CFP1026H-CDR Library of Congress:2009909582 ISBN:978-1-4244-5396,2010年12月,(EI核心检索) [5].“Re-Authentication Design for PKMv2 of IEEE 802.16e Standard”,IEEE Catalog Number:CFP1026H-CDR Library of Congress:2009909582 ISBN:978-1-4244-5396, 2010年12月,(EI核心检索) [6].“An energy-efficient scheme in next-generation sensor networks”,International Journal of Communication Systems,ISSN:1099-1131, 2010年8月,(SCI检索) [7].“A Fast Formation Flocking Scheme for a Group of Interactive Distributed Mobile Nodes in Autonomous Networks”,Kluwer Academic Publishers Hingham, MA, USA, ISSN: 1383-469X,2010年8月, (SCI检索) [8] “Research on The Profit Modes and Issues of Chinese Group-buying Websites”,ICMeCG2012,2012, (EI检索) [9]“Two Different Schemes of Authentication in IEEE 802.16j Multi-hop Relay Network”,WiCOM 2012,(EI检索) [10]An overview of ad hoc network security,2015.11,Communications in Computer and Information Science,EI核心
|